| audit-libs | CVE-2015-5186 | MEDIUM | 2.8.5-4.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/08/13/9 http://www.securityfocus.com/bid/76840 https://access.redhat.com/security/cve/CVE-2015-5186 https://bugzilla.redhat.com/show_bug.cgi?id=1251621 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186 https://fedorahosted.org/audit/changeset/1122 https://people.redhat.com/sgrubb/audit/ChangeLog
|
| audit-libs-python | CVE-2015-5186 | MEDIUM | 2.8.5-4.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/08/13/9 http://www.securityfocus.com/bid/76840 https://access.redhat.com/security/cve/CVE-2015-5186 https://bugzilla.redhat.com/show_bug.cgi?id=1251621 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5186 https://fedorahosted.org/audit/changeset/1122 https://people.redhat.com/sgrubb/audit/ChangeLog
|
| bash | CVE-2012-6711 | MEDIUM | 4.2.46-33.el7 | | Expand...http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5 http://www.securityfocus.com/bid/108824 https://access.redhat.com/security/cve/CVE-2012-6711 https://bugzilla.redhat.com/show_bug.cgi?id=1721071 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6711 https://support.f5.com/csp/article/K05122252 https://support.f5.com/csp/article/K05122252?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4180-1 https://usn.ubuntu.com/4180-1/
|
| bash | CVE-2019-9924 | MEDIUM | 4.2.46-33.el7 | 4.2.46-34.el7 | Expand...http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65 http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html https://access.redhat.com/security/cve/CVE-2019-9924 https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1803441 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924 https://linux.oracle.com/cve/CVE-2019-9924.html https://linux.oracle.com/errata/ELSA-2020-1113.html https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html https://lists.gnu.org/archive/html/bug-bash/2017-03/msg00077.html https://security.netapp.com/advisory/ntap-20190411-0001/ https://ubuntu.com/security/notices/USN-4058-1 https://ubuntu.com/security/notices/USN-4058-2 https://usn.ubuntu.com/4058-1/ https://usn.ubuntu.com/4058-2/
|
| bash | CVE-2019-18276 | LOW | 4.2.46-33.el7 | | Expand...http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html https://access.redhat.com/security/cve/CVE-2019-18276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276 https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff https://linux.oracle.com/cve/CVE-2019-18276.html https://linux.oracle.com/errata/ELSA-2021-1679.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2019-18276 https://security.gentoo.org/glsa/202105-34 https://security.netapp.com/advisory/ntap-20200430-0003/ https://ubuntu.com/security/notices/USN-5380-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.youtube.com/watch?v=-wGtxJ8opa8
|
| bind-license | CVE-2020-8616 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7_8.6 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html http://www.nxnsattack.com http://www.openwall.com/lists/oss-security/2020/05/19/4 https://access.redhat.com/security/cve/CVE-2020-8616 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8616 https://kb.isc.org/docs/cve-2020-8616 https://linux.oracle.com/cve/CVE-2020-8616.html https://linux.oracle.com/errata/ELSA-2020-2383.html https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/ https://security.netapp.com/advisory/ntap-20200522-0002/ https://ubuntu.com/security/notices/USN-4365-1 https://ubuntu.com/security/notices/USN-4365-2 https://usn.ubuntu.com/4365-1/ https://usn.ubuntu.com/4365-2/ https://www.debian.org/security/2020/dsa-4689 https://www.synology.com/security/advisory/Synology_SA_20_12 https://www.theregister.co.uk/2020/05/21/nxnaattack_bug_disclosed/
|
| bind-license | CVE-2020-8617 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7_8.6 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html http://packetstormsecurity.com/files/157836/BIND-TSIG-Denial-Of-Service.html http://www.openwall.com/lists/oss-security/2020/05/19/4 https://access.redhat.com/security/cve/CVE-2020-8617 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8617 https://kb.isc.org/docs/cve-2020-8617 https://linux.oracle.com/cve/CVE-2020-8617.html https://linux.oracle.com/errata/ELSA-2020-2383.html https://lists.debian.org/debian-lts-announce/2020/05/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JKJXVBOKZ36ER3EUCR7VRB7WGHIIMPNJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOGCJS2XQ3SQNF4W6GLZ73LWZJ6ZZWZI/ https://security.netapp.com/advisory/ntap-20200522-0002/ https://ubuntu.com/security/notices/USN-4365-1 https://ubuntu.com/security/notices/USN-4365-2 https://usn.ubuntu.com/4365-1/ https://usn.ubuntu.com/4365-2/ https://www.debian.org/security/2020/dsa-4689
|
| bind-license | CVE-2020-8625 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.4 | Expand...http://www.openwall.com/lists/oss-security/2021/02/19/1 http://www.openwall.com/lists/oss-security/2021/02/20/2 https://access.redhat.com/security/cve/CVE-2020-8625 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625 https://kb.isc.org/docs/cve-2020-8625 https://kb.isc.org/v1/docs/cve-2020-8625 https://linux.oracle.com/cve/CVE-2020-8625.html https://linux.oracle.com/errata/ELSA-2021-9117.html https://lists.debian.org/debian-lts-announce/2021/02/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBTPWRQWRQEJNWY4NHO4WLS4KLJ3ERHZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYXAF7G45RXDVNUTWWCI2CVTHRZ67LST/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QWCMBOSZOJIIET7BWTRYS3HLX5TSDKHX/ https://nvd.nist.gov/vuln/detail/CVE-2020-8625 https://security.netapp.com/advisory/ntap-20210319-0001/ https://ubuntu.com/security/notices/USN-4737-1 https://ubuntu.com/security/notices/USN-4737-2 https://www.debian.org/security/2021/dsa-4857 https://www.zerodayinitiative.com/advisories/ZDI-21-195/
|
| bind-license | CVE-2021-25215 | HIGH | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.5 | Expand...http://www.openwall.com/lists/oss-security/2021/04/29/1 http://www.openwall.com/lists/oss-security/2021/04/29/2 http://www.openwall.com/lists/oss-security/2021/04/29/3 http://www.openwall.com/lists/oss-security/2021/04/29/4 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25215.json https://access.redhat.com/security/cve/CVE-2021-25215 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215 https://kb.isc.org/docs/cve-2021-25215 https://kb.isc.org/v1/docs/cve-2021-25215 https://linux.oracle.com/cve/CVE-2021-25215.html https://linux.oracle.com/errata/ELSA-2021-9213.html https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/ https://nvd.nist.gov/vuln/detail/CVE-2021-25215 https://security.netapp.com/advisory/ntap-20210521-0006/ https://ubuntu.com/security/notices/USN-4929-1 https://www.debian.org/security/2021/dsa-4909 https://www.oracle.com/security-alerts/cpuoct2021.html
|
| bind-license | CVE-2019-6477 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html https://access.redhat.com/security/cve/CVE-2019-6477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477 https://kb.isc.org/docs/cve-2019-6477 https://linux.oracle.com/cve/CVE-2019-6477.html https://linux.oracle.com/errata/ELSA-2020-1845.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L3DEMNZMKR57VQJCG5ZN55ZGTQRL2TFQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XGURMGQHX45KR4QDRCSUQHODUFOGNGAN/ https://support.f5.com/csp/article/K15840535?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4197-1 https://www.debian.org/security/2020/dsa-4689 https://www.synology.com/security/advisory/Synology_SA_19_39
|
| bind-license | CVE-2020-8622 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.2 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html https://access.redhat.com/security/cve/CVE-2020-8622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8622 https://kb.isc.org/docs/cve-2020-8622 https://linux.oracle.com/cve/CVE-2020-8622.html https://linux.oracle.com/errata/ELSA-2020-5011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/ https://nvd.nist.gov/vuln/detail/CVE-2020-8622 https://security.gentoo.org/glsa/202008-19 https://security.netapp.com/advisory/ntap-20200827-0003/ https://ubuntu.com/security/notices/USN-4468-1 https://ubuntu.com/security/notices/USN-4468-2 https://usn.ubuntu.com/4468-1/ https://usn.ubuntu.com/4468-2/ https://www.debian.org/security/2020/dsa-4752 https://www.oracle.com/security-alerts/cpuoct2021.html https://www.synology.com/security/advisory/Synology_SA_20_19
|
| bind-license | CVE-2020-8623 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.2 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html https://access.redhat.com/security/cve/CVE-2020-8623 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623 https://kb.isc.org/docs/cve-2020-8623 https://linux.oracle.com/cve/CVE-2020-8623.html https://linux.oracle.com/errata/ELSA-2020-5011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00053.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/ https://nvd.nist.gov/vuln/detail/CVE-2020-8623 https://security.gentoo.org/glsa/202008-19 https://security.netapp.com/advisory/ntap-20200827-0003/ https://ubuntu.com/security/notices/USN-4468-1 https://usn.ubuntu.com/4468-1/ https://www.debian.org/security/2020/dsa-4752 https://www.synology.com/security/advisory/Synology_SA_20_19
|
| bind-license | CVE-2020-8624 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.2 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html https://access.redhat.com/security/cve/CVE-2020-8624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624 https://kb.isc.org/docs/cve-2020-8624 https://linux.oracle.com/cve/CVE-2020-8624.html https://linux.oracle.com/errata/ELSA-2020-5011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQN62GBMCIC5AY4KYADGXNKVY6AJKSJE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKAMJZXR66P6S5LEU4SN7USSNCWTXEXP/ https://nvd.nist.gov/vuln/detail/CVE-2020-8624 https://security.gentoo.org/glsa/202008-19 https://security.netapp.com/advisory/ntap-20200827-0003/ https://ubuntu.com/security/notices/USN-4468-1 https://usn.ubuntu.com/4468-1/ https://www.debian.org/security/2020/dsa-4752 https://www.synology.com/security/advisory/Synology_SA_20_19
|
| bind-license | CVE-2021-25214 | MEDIUM | 32:9.11.4-9.P2.el7 | 32:9.11.4-26.P2.el7_9.7 | Expand...http://www.openwall.com/lists/oss-security/2021/04/29/1 http://www.openwall.com/lists/oss-security/2021/04/29/2 http://www.openwall.com/lists/oss-security/2021/04/29/3 http://www.openwall.com/lists/oss-security/2021/04/29/4 https://access.redhat.com/security/cve/CVE-2021-25214 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214 https://kb.isc.org/docs/cve-2021-25214 https://kb.isc.org/v1/docs/cve-2021-25214 https://linux.oracle.com/cve/CVE-2021-25214.html https://linux.oracle.com/errata/ELSA-2021-4384.html https://lists.debian.org/debian-lts-announce/2021/05/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VEC2XG4Q2ODTN2C4CGXEIXU3EUTBMK7L/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDSRPCJQ7MZC6CENH5PO3VQOFI7VSWBE/ https://nvd.nist.gov/vuln/detail/CVE-2021-25214 https://security.netapp.com/advisory/ntap-20210521-0006/ https://ubuntu.com/security/notices/USN-4929-1 https://www.debian.org/security/2021/dsa-4909
|
| bind-license | CVE-2021-25219 | MEDIUM | 32:9.11.4-9.P2.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-25219 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25219 https://errata.almalinux.org/8/ALSA-2022-2092.html https://kb.isc.org/docs/cve-2021-25219 https://kb.isc.org/v1/docs/cve-2021-25219 https://linux.oracle.com/cve/CVE-2021-25219.html https://linux.oracle.com/errata/ELSA-2022-2092.html https://lists.debian.org/debian-lts-announce/2021/11/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EF4NAVRV4H3W4GA3LGGZYUKD3HSJBAVW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YGV7SA27CTYLGFJSPUM3V36ZWK7WWDI4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTKC4E3HUOLYN5IA4EBL4VAQSWG2ZVTX/ https://nvd.nist.gov/vuln/detail/CVE-2021-25219 https://security.netapp.com/advisory/ntap-20211118-0002/ https://ubuntu.com/security/notices/USN-5126-1 https://ubuntu.com/security/notices/USN-5126-2 https://www.debian.org/security/2021/dsa-4994 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| bind-license | CVE-2021-25220 | MEDIUM | 32:9.11.4-9.P2.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-25220 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220 https://kb.isc.org/docs/CVE-2021-25220 https://kb.isc.org/v1/docs/cve-2021-25220 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SXT7247QTKNBQ67MNRGZD23ADXU6E5U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VX3I2U3ICOIEI5Y7OYA6CHOLFMNH3YQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/API7U5E7SX7BAAVFNW366FFJGD6NZZKV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DE3UAVCPUMAKG27ZL5YXSP2C3RIOW3JZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYD7US4HZRFUGAJ66ZTHFBYVP5N3OQBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-25220 https://security.netapp.com/advisory/ntap-20220408-0001/ https://ubuntu.com/security/notices/USN-5332-1 https://ubuntu.com/security/notices/USN-5332-2
|
| bind-license | CVE-2013-5661 | LOW | 32:9.11.4-9.P2.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2013-5661 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5661 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5661 https://security-tracker.debian.org/tracker/CVE-2013-5661
|
| bind-license | CVE-2016-6170 | LOW | 32:9.11.4-9.P2.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/07/06/3 http://www.securityfocus.com/bid/91611 http://www.securitytracker.com/id/1036241 https://access.redhat.com/security/cve/CVE-2016-6170 https://bugzilla.redhat.com/show_bug.cgi?id=1353563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6170 https://github.com/sischkg/xfer-limit/blob/master/README.md https://kb.isc.org/article/AA-01390 https://kb.isc.org/article/AA-01390/0/Operational-Notification%3A-A-party-that-is-allowed-control-over-zone-data-can-overwhelm-a-server-by-transferring-huge-quantities-of-data.html https://kb.isc.org/article/AA-01390/169/CVE-2016-6170 https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html https://security.gentoo.org/glsa/201610-07
|
| bind-license | CVE-2018-5745 | LOW | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7 | Expand...https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2018-5745 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745 https://kb.isc.org/docs/cve-2018-5745 https://linux.oracle.com/cve/CVE-2018-5745.html https://linux.oracle.com/errata/ELSA-2020-1061.html https://ubuntu.com/security/notices/USN-3893-1 https://ubuntu.com/security/notices/USN-3893-2
|
| bind-license | CVE-2019-6465 | LOW | 32:9.11.4-9.P2.el7 | 32:9.11.4-16.P2.el7 | Expand...https://access.redhat.com/errata/RHSA-2019:3552 https://access.redhat.com/security/cve/CVE-2019-6465 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465 https://kb.isc.org/docs/cve-2019-6465 https://linux.oracle.com/cve/CVE-2019-6465.html https://linux.oracle.com/errata/ELSA-2020-1061.html https://ubuntu.com/security/notices/USN-3893-1 https://ubuntu.com/security/notices/USN-3893-2
|
| binutils | CVE-2017-6965 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-6965 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6965 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21137 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-6966 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-6966 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6966 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21139 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2018-20673 | MEDIUM | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| binutils | CVE-2019-9074 | MEDIUM | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html https://access.redhat.com/security/cve/CVE-2019-9074 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9074 https://nvd.nist.gov/vuln/detail/CVE-2019-9074 https://security.gentoo.org/glsa/202107-24 https://security.netapp.com/advisory/ntap-20190314-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=24235 https://support.f5.com/csp/article/K09092524 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2019-9075 | MEDIUM | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html https://access.redhat.com/security/cve/CVE-2019-9075 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9075 https://nvd.nist.gov/vuln/detail/CVE-2019-9075 https://security.gentoo.org/glsa/202107-24 https://security.netapp.com/advisory/ntap-20190314-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=24236 https://support.f5.com/csp/article/K42059040 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2019-9077 | MEDIUM | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/107139 https://access.redhat.com/security/cve/CVE-2019-9077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9077 https://nvd.nist.gov/vuln/detail/CVE-2019-9077 https://security.gentoo.org/glsa/202107-24 https://security.netapp.com/advisory/ntap-20190314-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=24243 https://support.f5.com/csp/article/K00056379 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2020-16590 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-16590 https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25821 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c98a4545dc7bf2bcaf1de539c4eb84784680eaa4
|
| binutils | CVE-2020-16592 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-16592 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16592 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJIW6KKY2TSLD43XEZXG56WREIIBUIIQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKIMSD5FIC3QFJDKNHR2PSO6JYJGCLHB/ https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25823 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7ecb51549ab1ec22aba5aaf34b70323cf0b8509a https://ubuntu.com/security/notices/USN-5124-1
|
| binutils | CVE-2021-20197 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20197 https://bugzilla.redhat.com/show_bug.cgi?id=1913743 https://linux.oracle.com/cve/CVE-2021-20197.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://nvd.nist.gov/vuln/detail/CVE-2021-20197 https://security.netapp.com/advisory/ntap-20210528-0009/ https://sourceware.org/bugzilla/show_bug.cgi?id=26945
|
| binutils | CVE-2021-20294 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20294 https://bugzilla.redhat.com/show_bug.cgi?id=1943533 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2021-20294 https://sourceware.org/bugzilla/show_bug.cgi?id=26929 https://sourceware.org/git/?p=binutils-gdb.git;a=patch;h=372dd157272e0674d13372655cc60eaca9c06926
|
| binutils | CVE-2021-3487 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3487 https://bugzilla.redhat.com/show_bug.cgi?id=1947111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3487 https://linux.oracle.com/cve/CVE-2021-3487.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Z3KSJY3CLAAFFT7FNFCJOMDITPQGN56/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q6V2LF5AVOUTHPYY2O5TRNAIXVMXFDGL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNBNDMJWZOQYCEZXENHBSM6DBZ332UZZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3487 https://ubuntu.com/security/notices/USN-5124-1 https://ubuntu.com/security/notices/USN-5341-1
|
| binutils | CVE-2021-37322 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-37322 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37322 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=99188 https://nvd.nist.gov/vuln/detail/CVE-2021-37322
|
| binutils | CVE-2021-42574 | MEDIUM | 2.27-41.base.el7 | 2.27-44.base.el7_9.1 | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| binutils | CVE-2021-45078 | MEDIUM | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-45078 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45078 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UQBH244M5PV6S6UMHUTCVCWFZDX7Y4M6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UUHLDDT3HH7YEY6TX7IJRGPJUTNNVEL3/ https://nvd.nist.gov/vuln/detail/CVE-2021-45078 https://security.netapp.com/advisory/ntap-20220107-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=28694 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=161e87d12167b1e36193385485c1f6ce92f74f02 https://ubuntu.com/security/notices/USN-5341-1
|
| binutils | CVE-2014-9939 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/07/31/6 https://access.redhat.com/security/cve/CVE-2014-9939 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939 https://sourceware.org/bugzilla/show_bug.cgi?id=18750 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e27a9d5f22f9f7ead11738b1546d0b5c737266b https://ubuntu.com/security/notices/USN-3367-1
|
| binutils | CVE-2015-8538 | LOW | 2.27-41.base.el7 | | Expand...http://sourceforge.net/p/libdwarf/code/ci/da724a0bc5eec8e9ec0b0cb0c238a80e34466459/ http://www.openwall.com/lists/oss-security/2015/12/09/2 http://www.openwall.com/lists/oss-security/2015/12/10/3 https://access.redhat.com/security/cve/CVE-2015-8538 https://bugzilla.redhat.com/show_bug.cgi?id=1289385 https://bugzilla.redhat.com/show_bug.cgi?id=1291299 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8538
|
| binutils | CVE-2016-2226 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| binutils | CVE-2016-4487 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2016-4488 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2016-4489 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2016-4490 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2016-4491 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2016-4492 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2016-4493 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12449 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12449 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12449 https://sourceware.org/bugzilla/show_bug.cgi?id=21840 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12451 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12451 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12451 https://sourceware.org/bugzilla/show_bug.cgi?id=21786 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12452 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12452 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12452 https://sourceware.org/bugzilla/show_bug.cgi?id=21813 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12453 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12453 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12453 https://sourceware.org/bugzilla/show_bug.cgi?id=21813 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12454 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12454 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12454 https://sourceware.org/bugzilla/show_bug.cgi?id=21813 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12455 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12455 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12455 https://sourceware.org/bugzilla/show_bug.cgi?id=21840 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12456 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12456 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12456 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21813 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12457 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12457 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12457 https://sourceware.org/bugzilla/show_bug.cgi?id=21840 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12458 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-12458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12458 https://sourceware.org/bugzilla/show_bug.cgi?id=21840 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12799 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/100292 https://access.redhat.com/security/cve/CVE-2017-12799 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12799 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21933 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-12967 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/100462 https://access.redhat.com/security/cve/CVE-2017-12967 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12967 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21962 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-13710 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/100499 https://access.redhat.com/security/cve/CVE-2017-13710 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13710 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0c54f69295208331faab9bc5e995111a35672f9b https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d6f8dea6798528de0fc762409595251eeeb1f547 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-13716 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13716 https://sourceware.org/bugzilla/show_bug.cgi?id=22009
|
| binutils | CVE-2017-13757 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/100532 https://access.redhat.com/security/cve/CVE-2017-13757 https://sourceware.org/bugzilla/show_bug.cgi?id=22018 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=90efb6422939ca031804266fba669f77c22a274a
|
| binutils | CVE-2017-14128 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/100623 https://access.redhat.com/security/cve/CVE-2017-14128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14128 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=22059 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7e8b60085eb3e6f2c41bc0c00c0d759fa7f72780 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14129 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/100624 https://access.redhat.com/security/cve/CVE-2017-14129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14129 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=22047 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e4f2723003859dc6b33ca0dadbc4a7659ebf1643 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14130 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/100625 https://access.redhat.com/security/cve/CVE-2017-14130 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14130 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=22058 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=2a143b99fc4a5094a9cf128f3184d8e6818c8229 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14529 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14529 https://sourceware.org/bugzilla/show_bug.cgi?id=22113 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4d465c689a8fb27212ef358d0aee89d60dee69a6 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=dcaaca89e8618eba35193c27afcb1cfa54f74582 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14729 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14729 https://blogs.gentoo.org/ago/2017/09/25/binutils-heap-based-buffer-overflow-in-_bfd_x86_elf_get_synthetic_symtab-elfxx-x86-c/ https://sourceware.org/bugzilla/show_bug.cgi?id=22170 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=56933f9e3e90eebf1018ed7417d6c1184b91db6b https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=61e3bf5f83f7e505b6bc51ef65426e5b31e6e360
|
| binutils | CVE-2017-14745 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14745 https://sourceware.org/bugzilla/show_bug.cgi?id=22148
|
| binutils | CVE-2017-14930 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14930 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14930 https://sourceware.org/bugzilla/show_bug.cgi?id=22191 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a26a013f22a19e2c16729e64f40ef8a7dfcc086e https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14932 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14932 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14932 https://sourceware.org/bugzilla/show_bug.cgi?id=22204 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e338894dc2e603683bed2172e8e9f25b29051005 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14933 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101203 https://access.redhat.com/security/cve/CVE-2017-14933 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22210 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=30d0157a2ad64e64e5ff9fcc0dbe78a3e682f573 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=33e0a9a056bd23e923b929a4f2ab049ade0b1c32
|
| binutils | CVE-2017-14934 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101204 https://access.redhat.com/security/cve/CVE-2017-14934 https://sourceware.org/bugzilla/show_bug.cgi?id=22219 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=19485196044b2521af979f1e5c4a89bfb90fba0b
|
| binutils | CVE-2017-14938 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101212 https://access.redhat.com/security/cve/CVE-2017-14938 https://blogs.gentoo.org/ago/2017/09/26/binutils-memory-allocation-failure-in-_bfd_elf_slurp_version_tables-elf-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14938 https://sourceware.org/bugzilla/show_bug.cgi?id=22166 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bd61e135492ecf624880e6b78e5fcde3c9716df6 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14939 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101216 https://access.redhat.com/security/cve/CVE-2017-14939 https://blogs.gentoo.org/ago/2017/09/26/binutils-heap-based-buffer-overflow-in-read_1_byte-dwarf2-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14939 https://sourceware.org/bugzilla/show_bug.cgi?id=22169 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=515f23e63c0074ab531bc954f84ca40c6281a724 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42970/
|
| binutils | CVE-2017-14940 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14940 https://blogs.gentoo.org/ago/2017/09/26/binutils-null-pointer-dereference-in-scan_unit_for_symbols-dwarf2-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14940 https://sourceware.org/bugzilla/show_bug.cgi?id=22166 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0d76029f92182c3682d8be2c833d45bc9a2068fe https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-14974 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14974 https://sourceware.org/bugzilla/show_bug.cgi?id=22163 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=e70c19e3a4c26e9c1ebf0c9170d105039b56d7cf
|
| binutils | CVE-2017-15020 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-15020 https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-parse_die-dwarf1-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15020 https://sourceware.org/bugzilla/show_bug.cgi?id=22202 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1da5c9a485f3dcac4c45e96ef4b7dae5948314b5 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15021 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-15021 https://blogs.gentoo.org/ago/2017/10/03/binutils-heap-based-buffer-overflow-in-bfd_getl32-opncls-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15021 https://sourceware.org/bugzilla/show_bug.cgi?id=22197 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52b36c51e5bf6d7600fdc6ba115b170b0e78e31d https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15022 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-15022 https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-bfd_hash_hash-hash-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15022 https://sourceware.org/bugzilla/show_bug.cgi?id=22201 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11855d8a1f11b102a702ab76e95b22082cccf2f8 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15023 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101611 https://access.redhat.com/security/cve/CVE-2017-15023 https://blogs.gentoo.org/ago/2017/10/03/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c/ https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=22200 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c361faae8d964db951b7100cada4dcdc983df1bf
|
| binutils | CVE-2017-15024 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-15024 https://blogs.gentoo.org/ago/2017/10/03/binutils-infinite-loop-in-find_abstract_instance_name-dwarf2-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15024 https://sourceware.org/bugzilla/show_bug.cgi?id=22187 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=52a93b95ec0771c97e26f0bb28630a271a667bd2 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15025 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-15025 https://blogs.gentoo.org/ago/2017/10/03/binutils-divide-by-zero-in-decode_line_info-dwarf2-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15025 https://sourceware.org/bugzilla/show_bug.cgi?id=22186 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d8010d3e75ec7194a4703774090b27486b742d48 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15225 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-15225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15225 https://sourceware.org/bugzilla/show_bug.cgi?id=22212 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b55ec8b676ed05d93ee49d6c79ae0403616c4fb0 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15938 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101610 https://access.redhat.com/security/cve/CVE-2017-15938 https://blogs.gentoo.org/ago/2017/10/24/binutils-invalid-memory-read-in-find_abstract_instance_name-dwarf2-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15938 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=22209 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=1b86808a86077722ee4f42ff97f836b12420bb2a https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15939 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101613 https://access.redhat.com/security/cve/CVE-2017-15939 https://blogs.gentoo.org/ago/2017/10/24/binutils-null-pointer-dereference-in-concat_filename-dwarf2-c-incomplete-fix-for-cve-2017-15023/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15939 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=22205 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a54018b72d75abf2e74bf36016702da06399c1d9 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-15996 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101608 https://access.redhat.com/security/cve/CVE-2017-15996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15996 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=22361 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d91f0b20e561e326ee91a09a76206257bde8438b https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-16826 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16826 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16826 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22376 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=a67d66eb97e7613a38ffe6622d837303b3ecd31d https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-16827 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16827 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16827 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22306 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0301ce1486b1450f219202677f30d0fa97335419 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-16828 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16828 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16828 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22386 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=bf59c5d5f4f5b8b4da1f5f605cfa546f8029b43d https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-16829 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16829 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22307 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=cf54ebff3b7361989712fd9c0128a9b255578163
|
| binutils | CVE-2017-16830 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/101941 https://access.redhat.com/security/cve/CVE-2017-16830 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22384 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6ab2c4ed51f9c4243691755e1b1d2149c6a426f4
|
| binutils | CVE-2017-16831 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16831 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16831 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22385 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6cee897971d4d7cd37d2a686bb6d2aa3e759c8ca https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-16832 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16832 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16832 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22373 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0bb6961f18b8e832d88b490d421ca56cea16c45b https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-17080 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17080 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17080 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22421 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-17121 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17121 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22506 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b23dc97fe237a1d9e850d7cbeee066183a00630b https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-17122 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17122 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17122 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22508 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d785b7d4b877ed465d04072e17ca19d0f47d840f https://ubuntu.com/security/notices/USN-5341-1
|
| binutils | CVE-2017-17123 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17123 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22509 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=4581a1c7d304ce14e714b27522ebf3d0188d6543 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-17124 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17124 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22507 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b0029dce6867de1a2828293177b0e030d2f0f03c https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-17125 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17125 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22443 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=160b1a618ad94988410dc81fce9189fcda5b7ff4 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-17126 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17126 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22510 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f425ec6600b69e39eb605f3128806ff688137ea8
|
| binutils | CVE-2017-6969 | LOW | 2.27-41.base.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/03/16/8 http://www.securityfocus.com/bid/97065 https://access.redhat.com/security/cve/CVE-2017-6969 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6969 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21156 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7209 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/96994 https://access.redhat.com/security/cve/CVE-2017-7209 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7209 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21135 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7210 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/96992 https://access.redhat.com/security/cve/CVE-2017-7210 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7210 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21157 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7223 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7223 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7223 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20898 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7224 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97277 https://access.redhat.com/security/cve/CVE-2017-7224 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7224 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20892 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7225 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97275 https://access.redhat.com/security/cve/CVE-2017-7225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7225 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20891 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7226 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7226 https://sourceware.org/bugzilla/show_bug.cgi?id=20905 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7227 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97209 https://access.redhat.com/security/cve/CVE-2017-7227 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7227 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20906 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7299 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97217 https://access.redhat.com/security/cve/CVE-2017-7299 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7299 https://sourceware.org/bugzilla/show_bug.cgi?id=20908 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7300 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97219 https://access.redhat.com/security/cve/CVE-2017-7300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7300 https://sourceware.org/bugzilla/show_bug.cgi?id=20909 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7301 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97218 https://access.redhat.com/security/cve/CVE-2017-7301 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7301 https://sourceware.org/bugzilla/show_bug.cgi?id=20924 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7302 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97216 https://access.redhat.com/security/cve/CVE-2017-7302 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7302 https://sourceware.org/bugzilla/show_bug.cgi?id=20921 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-7303 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97213 https://access.redhat.com/security/cve/CVE-2017-7303 https://sourceware.org/bugzilla/show_bug.cgi?id=20922
|
| binutils | CVE-2017-7304 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/97215 https://access.redhat.com/security/cve/CVE-2017-7304 https://sourceware.org/bugzilla/show_bug.cgi?id=20931
|
| binutils | CVE-2017-7614 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7614 https://blogs.gentoo.org/ago/2017/04/05/binutils-two-null-pointer-dereference-in-elflink-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7614 https://security.gentoo.org/glsa/201709-02 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-8392 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8392 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21409
|
| binutils | CVE-2017-8393 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8393 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8393 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21412 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-8394 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8394 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8394 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21414 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-8395 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8395 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21431 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-8396 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8396 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8396 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21432 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-8397 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8397 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8397 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21434 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-8398 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8398 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8398 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21438 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-8421 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8421 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8421 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21440 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9038 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/98589 https://access.redhat.com/security/cve/CVE-2017-9038 https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9038 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f32ba72991d2406b21ab17edc234a2f3fa7fb23d https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9039 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/98580 https://access.redhat.com/security/cve/CVE-2017-9039 https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9039 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=82156ab704b08b124d319c0decdbd48b3ca2dac5 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9040 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/98579 https://access.redhat.com/security/cve/CVE-2017-9040 https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9040 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9041 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/98598 https://access.redhat.com/security/cve/CVE-2017-9041 https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9041 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75ec1fdbb797a389e4fe4aaf2e15358a070dcc19 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c4ab9505b53cdc899506ed421fddb7e1f8faf7a3 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9042 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-9042 https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9042 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=7296a62a2a237f6b1ad8db8c38b090e9f592c8cf https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9043 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/98591 https://access.redhat.com/security/cve/CVE-2017-9043 https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ddef72cdc10d82ba011a7ff81cafbbd3466acf54
|
| binutils | CVE-2017-9044 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/98587 https://access.redhat.com/security/cve/CVE-2017-9044 https://blogs.gentoo.org/ago/2017/05/12/binutils-multiple-crashes/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9044 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9742 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99105 https://access.redhat.com/security/cve/CVE-2017-9742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9742 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21576 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42203/
|
| binutils | CVE-2017-9743 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99106 https://access.redhat.com/security/cve/CVE-2017-9743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9743 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21577
|
| binutils | CVE-2017-9744 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99108 https://access.redhat.com/security/cve/CVE-2017-9744 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9744 https://sourceware.org/bugzilla/show_bug.cgi?id=21578 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9745 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99109 https://access.redhat.com/security/cve/CVE-2017-9745 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9745 https://sourceware.org/bugzilla/show_bug.cgi?id=21579 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9746 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99117 https://access.redhat.com/security/cve/CVE-2017-9746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9746 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21580 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42199/
|
| binutils | CVE-2017-9747 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99114 https://access.redhat.com/security/cve/CVE-2017-9747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9747 https://sourceware.org/bugzilla/show_bug.cgi?id=21581 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42200/
|
| binutils | CVE-2017-9748 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99110 https://access.redhat.com/security/cve/CVE-2017-9748 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9748 https://sourceware.org/bugzilla/show_bug.cgi?id=21582 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42202/
|
| binutils | CVE-2017-9749 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99113 https://access.redhat.com/security/cve/CVE-2017-9749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9749 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21586 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42201/
|
| binutils | CVE-2017-9750 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99118 https://access.redhat.com/security/cve/CVE-2017-9750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9750 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21587 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42198/
|
| binutils | CVE-2017-9751 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99111 https://access.redhat.com/security/cve/CVE-2017-9751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9751 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21588 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9752 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99122 https://access.redhat.com/security/cve/CVE-2017-9752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9752 https://sourceware.org/bugzilla/show_bug.cgi?id=21589 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9753 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99116 https://access.redhat.com/security/cve/CVE-2017-9753 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9753 https://sourceware.org/bugzilla/show_bug.cgi?id=21591 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9754 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99125 https://access.redhat.com/security/cve/CVE-2017-9754 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9754 https://sourceware.org/bugzilla/show_bug.cgi?id=21591 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9755 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99124 https://access.redhat.com/security/cve/CVE-2017-9755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9755 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21594 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9756 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99103 https://access.redhat.com/security/cve/CVE-2017-9756 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9756 https://security.gentoo.org/glsa/201801-01 https://sourceware.org/bugzilla/show_bug.cgi?id=21595 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42204/
|
| binutils | CVE-2017-9954 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99307 https://access.redhat.com/security/cve/CVE-2017-9954 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9954 https://security.gentoo.org/glsa/201709-02 https://sourceware.org/bugzilla/show_bug.cgi?id=21670 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2017-9955 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/99573 https://access.redhat.com/security/cve/CVE-2017-9955 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9955 https://sourceware.org/bugzilla/show_bug.cgi?id=21665
|
| binutils | CVE-2018-12698 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/104539 https://access.redhat.com/security/cve/CVE-2018-12698 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12698 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454 https://security.gentoo.org/glsa/201908-01 https://sourceware.org/bugzilla/show_bug.cgi?id=23057 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-12699 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/104540 https://access.redhat.com/security/cve/CVE-2018-12699 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763102 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12699 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85454 https://security.gentoo.org/glsa/201908-01 https://sourceware.org/bugzilla/show_bug.cgi?id=23057 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-12934 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-12934 https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1763101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12934 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85453 https://sourceware.org/bugzilla/show_bug.cgi?id=23059 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-17360 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html https://access.redhat.com/security/cve/CVE-2018-17360 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17360 https://sourceware.org/bugzilla/show_bug.cgi?id=23685 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-17794 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-17794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17794 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87350 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-17985 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html https://access.redhat.com/security/cve/CVE-2018-17985 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17985 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87335 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-18483 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/105689 https://access.redhat.com/security/cve/CVE-2018-18483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18483 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87602 https://sourceware.org/bugzilla/show_bug.cgi?id=23767 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-18484 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/105693 https://access.redhat.com/security/cve/CVE-2018-18484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18484 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87636 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-18605 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/105754 https://access.redhat.com/security/cve/CVE-2018-18605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18605 https://security.netapp.com/advisory/ntap-20190307-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=23804 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ab419ddbb2cdd17ca83618990f2cacf904ce1d61 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-18606 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/105754 https://access.redhat.com/security/cve/CVE-2018-18606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18606 https://security.netapp.com/advisory/ntap-20190307-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=23806 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45a0eaf77022963d639d6d19871dbab7b79703fc https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-18607 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/105754 https://access.redhat.com/security/cve/CVE-2018-18607 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18607 https://security.netapp.com/advisory/ntap-20190307-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=23805 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=102def4da826b3d9e169741421e5e67e8731909a https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-18700 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-18700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18700 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87681 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-18701 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-18701 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18701 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=87675 https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-19932 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/106144 https://access.redhat.com/security/cve/CVE-2018-19932 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19932 https://security.gentoo.org/glsa/201908-01 https://security.netapp.com/advisory/ntap-20190221-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=23932 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=beab453223769279cc1cef68a1622ab8978641f7 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-20002 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/106142 https://access.redhat.com/security/cve/CVE-2018-20002 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20002 https://security.gentoo.org/glsa/201908-01 https://security.netapp.com/advisory/ntap-20190221-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=23952 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=c2f5dc30afa34696f2da0081c4ac50b958ecb0e9 https://support.f5.com/csp/article/K62602089 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2018-20657 | LOW | 2.27-41.base.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| binutils | CVE-2018-6323 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/102821 https://access.redhat.com/security/cve/CVE-2018-6323 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6323 https://sourceware.org/bugzilla/show_bug.cgi?id=22746 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/44035/
|
| binutils | CVE-2018-6759 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/103030 https://access.redhat.com/security/cve/CVE-2018-6759 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6759 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22794 https://ubuntu.com/security/notices/USN-4336-2
|
| binutils | CVE-2018-6872 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html http://www.securityfocus.com/bid/103103 https://access.redhat.com/security/cve/CVE-2018-6872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6872 https://security.gentoo.org/glsa/201811-17 https://sourceware.org/bugzilla/show_bug.cgi?id=22788 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=commit;h=ef135d4314fd4c2d7da66b9d7b59af4a85b0f7e6
|
| binutils | CVE-2019-1010204 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-1010204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010204 https://linux.oracle.com/cve/CVE-2019-1010204.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://security.netapp.com/advisory/ntap-20190822-0001/ https://sourceware.org/bugzilla/show_bug.cgi?id=23765 https://support.f5.com/csp/article/K05032915?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-5349-1
|
| binutils | CVE-2019-12972 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/108903 https://access.redhat.com/security/cve/CVE-2019-12972 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12972 https://nvd.nist.gov/vuln/detail/CVE-2019-12972 https://security.gentoo.org/glsa/202007-39 https://sourceware.org/bugzilla/show_bug.cgi?id=24689 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=890f750a3b053532a4b839a2dd6243076de12031 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2019-14250 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2019-17450 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html https://access.redhat.com/security/cve/CVE-2019-17450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17450 https://linux.oracle.com/cve/CVE-2019-17450.html https://linux.oracle.com/errata/ELSA-2020-4465.html https://nvd.nist.gov/vuln/detail/CVE-2019-17450 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20191024-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25078 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2019-17451 | LOW | 2.27-41.base.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html https://access.redhat.com/security/cve/CVE-2019-17451 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17451 https://linux.oracle.com/cve/CVE-2019-17451.html https://linux.oracle.com/errata/ELSA-2020-1797.html https://nvd.nist.gov/vuln/detail/CVE-2019-17451 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20191024-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=25070 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=336bfbeb1848f4b9558456fdcf283ee8a32d7fd1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4336-1/
|
| binutils | CVE-2020-16591 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-16591 https://security.netapp.com/advisory/ntap-20210115-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25822 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=001890e1f9269697f7e0212430a51479271bdab2
|
| binutils | CVE-2020-16593 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-16593 https://security.netapp.com/advisory/ntap-20210122-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25827 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=aec72fda3b320c36eb99fc1c4cf95b10fc026729
|
| binutils | CVE-2020-16599 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-16599 https://security.netapp.com/advisory/ntap-20210122-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25842 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d55d10ac0d112c586eaceb92e75bd9b80aadcc4
|
| binutils | CVE-2020-35448 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35448 https://linux.oracle.com/cve/CVE-2020-35448.html https://linux.oracle.com/errata/ELSA-2021-4364.html https://security.gentoo.org/glsa/202107-24 https://security.netapp.com/advisory/ntap-20210129-0008/ https://sourceware.org/bugzilla/show_bug.cgi?id=26574 https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8642dafaef21aa6747cec01df1977e9c52eb4679
|
| binutils | CVE-2020-35493 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35493 https://bugzilla.redhat.com/show_bug.cgi?id=1911437 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/ https://nvd.nist.gov/vuln/detail/CVE-2020-35493 https://security.netapp.com/advisory/ntap-20210212-0007/
|
| binutils | CVE-2020-35494 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35494 https://bugzilla.redhat.com/show_bug.cgi?id=1911439 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/ https://nvd.nist.gov/vuln/detail/CVE-2020-35494 https://security.netapp.com/advisory/ntap-20210212-0007/
|
| binutils | CVE-2020-35495 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35495 https://bugzilla.redhat.com/show_bug.cgi?id=1911441 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/ https://nvd.nist.gov/vuln/detail/CVE-2020-35495 https://security.netapp.com/advisory/ntap-20210212-0007/
|
| binutils | CVE-2020-35496 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35496 https://bugzilla.redhat.com/show_bug.cgi?id=1911444 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KOK3QWSVOUJWJ54HVGIFWNLWQ5ZY4S6/ https://nvd.nist.gov/vuln/detail/CVE-2020-35496 https://security.netapp.com/advisory/ntap-20210212-0007/
|
| binutils | CVE-2020-35507 | LOW | 2.27-41.base.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35507 https://bugzilla.redhat.com/show_bug.cgi?id=1911691 https://nvd.nist.gov/vuln/detail/CVE-2020-35507 https://security.netapp.com/advisory/ntap-20210212-0007/
|
| bzip2-libs | CVE-2016-3189 | LOW | 1.0.6-13.el7 | | Expand...http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html http://www.openwall.com/lists/oss-security/2016/06/20/1 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91297 http://www.securitytracker.com/id/1036132 https://access.redhat.com/security/cve/CVE-2016-3189 https://bugzilla.redhat.com/show_bug.cgi?id=1319648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189 https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e@%3Cjira.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html https://marc.info/?l=oss-security&m=146642106322396&w=2 https://nvd.nist.gov/vuln/detail/CVE-2016-3189 https://seclists.org/bugtraq/2019/Aug/4 https://seclists.org/bugtraq/2019/Jul/22 https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc https://security.gentoo.org/glsa/201708-08 https://ubuntu.com/security/notices/USN-4038-1 https://ubuntu.com/security/notices/USN-4038-2 https://usn.ubuntu.com/4038-1/ https://usn.ubuntu.com/4038-2/ https://www.oracle.com/security-alerts/cpuoct2020.html
|
| bzip2-libs | CVE-2019-12900 | LOW | 1.0.6-13.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00000.html http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html https://access.redhat.com/security/cve/CVE-2019-12900 https://bugs.launchpad.net/ubuntu/+source/bzip2/+bug/1834494 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900 https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774@%3Cuser.flink.apache.org%3E https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4@%3Cuser.flink.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2019-12900 https://seclists.org/bugtraq/2019/Aug/4 https://seclists.org/bugtraq/2019/Jul/22 https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc https://support.f5.com/csp/article/K68713584?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4038-1 https://ubuntu.com/security/notices/USN-4038-2 https://ubuntu.com/security/notices/USN-4038-3 https://ubuntu.com/security/notices/USN-4038-4 https://ubuntu.com/security/notices/USN-4146-1 https://ubuntu.com/security/notices/USN-4146-2 https://usn.ubuntu.com/4038-1/ https://usn.ubuntu.com/4038-2/ https://usn.ubuntu.com/4146-1/ https://usn.ubuntu.com/4146-2/ https://www.oracle.com/security-alerts/cpuoct2020.html
|
| coreutils | CVE-2016-2781 | MEDIUM | 8.22-24.el7 | | Expand...http://seclists.org/oss-sec/2016/q1/452 http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://access.redhat.com/security/cve/CVE-2016-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2781 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lore.kernel.org/patchwork/patch/793178/ https://nvd.nist.gov/vuln/detail/CVE-2016-2781
|
| coreutils | CVE-2017-18018 | MEDIUM | 8.22-24.el7 | | Expand...http://lists.gnu.org/archive/html/coreutils/2017-12/msg00045.html https://access.redhat.com/security/cve/CVE-2017-18018
|
| coreutils | CVE-2014-9471 | LOW | 8.22-24.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0029.html http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872 http://debbugs.gnu.org/cgi/bugreport.cgi?msg=11;filename=date-tz-crash.patch;att=1;bug=16872 http://debbugs.gnu.org/cgi/bugreport.cgi?msg=19;filename=coreutils-date-crash.patch;att=1;bug=16872 http://secunia.com/advisories/62226 http://ubuntu.com/usn/usn-2473-1 http://www.mandriva.com/security/advisories?name=MDVSA-2015:179 http://www.openwall.com/lists/oss-security/2014/11/25/1 http://www.openwall.com/lists/oss-security/2014/11/25/4 http://www.openwall.com/lists/oss-security/2015/01/03/11 https://access.redhat.com/security/cve/CVE-2014-9471 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766147 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471 https://security.gentoo.org/glsa/201612-22 https://ubuntu.com/security/notices/USN-2473-1
|
| coreutils | CVE-2015-4041 | LOW | 8.22-24.el7 | | Expand...http://openwall.com/lists/oss-security/2015/05/15/1 https://access.redhat.com/security/cve/CVE-2015-4041 https://bugzilla.suse.com/show_bug.cgi?id=928749 https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
|
| coreutils | CVE-2015-4042 | LOW | 8.22-24.el7 | | Expand...http://openwall.com/lists/oss-security/2015/05/15/1 https://access.redhat.com/security/cve/CVE-2015-4042 https://github.com/pixelb/coreutils/commit/bea5e36cc876ed627bb5e0eca36fdfaa6465e940
|
| cpio | CVE-2019-14866 | MEDIUM | 2.11-27.el7 | 2.11-28.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-14866 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866 https://linux.oracle.com/cve/CVE-2019-14866.html https://linux.oracle.com/errata/ELSA-2021-1582.html https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html https://ubuntu.com/security/notices/USN-4176-1
|
| cpio | CVE-2021-38185 | MEDIUM | 2.11-27.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-38185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185 https://errata.almalinux.org/8/ALSA-2022-1991.html https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b https://github.com/fangqyi/cpiopwn https://linux.oracle.com/cve/CVE-2021-38185.html https://linux.oracle.com/errata/ELSA-2022-1991.html https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html https://nvd.nist.gov/vuln/detail/CVE-2021-38185 https://ubuntu.com/security/notices/USN-5064-1 https://ubuntu.com/security/notices/USN-5064-2
|
| cpio | CVE-2015-1197 | LOW | 2.11-27.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0080.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:066 http://www.openwall.com/lists/oss-security/2015/01/07/5 http://www.openwall.com/lists/oss-security/2015/01/18/7 http://www.securityfocus.com/bid/71914 http://www.ubuntu.com/usn/USN-2906-1 https://access.redhat.com/security/cve/CVE-2015-1197 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197 https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html https://ubuntu.com/security/notices/USN-2906-1
|
| cpio | CVE-2016-2037 | LOW | 2.11-27.el7 | | Expand...http://www.debian.org/security/2016/dsa-3483 http://www.openwall.com/lists/oss-security/2016/01/19/4 http://www.openwall.com/lists/oss-security/2016/01/22/4 http://www.securityfocus.com/bid/82293 http://www.securitytracker.com/id/1035067 http://www.ubuntu.com/usn/USN-2906-1 https://access.redhat.com/security/cve/CVE-2016-2037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037 https://ubuntu.com/security/notices/USN-2906-1
|
| cpp | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| cpp | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| cpp | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| cpp | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| cpp | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| cpp | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| cpp | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| cpp | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| cpp | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| cpp | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| cpp | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| cpp | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| cpp | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| cpp | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| cpp | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| cpp | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| cpp | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| cpp | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| cpp | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| cpp | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| cpp | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| cpp | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| cpp | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| cpp | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| cracklib | CVE-2016-6318 | LOW | 2.9.0-11.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html http://seclists.org/oss-sec/2016/q3/290 http://www.openwall.com/lists/oss-security/2016/08/16/2 http://www.securityfocus.com/bid/92478 https://access.redhat.com/security/cve/CVE-2016-6318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html https://security.gentoo.org/glsa/201612-25
|
| cracklib-dicts | CVE-2016-6318 | LOW | 2.9.0-11.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00122.html http://seclists.org/oss-sec/2016/q3/290 http://www.openwall.com/lists/oss-security/2016/08/16/2 http://www.securityfocus.com/bid/92478 https://access.redhat.com/security/cve/CVE-2016-6318 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6318 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/05/msg00023.html https://security.gentoo.org/glsa/201612-25
|
| curl | CVE-2015-3153 | MEDIUM | 7.29.0-54.el7 | | Expand...http://curl.haxx.se/docs/adv_20150429.html http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html http://www.debian.org/security/2015/dsa-3240 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html http://www.securityfocus.com/bid/74408 http://www.securitytracker.com/id/1032233 http://www.ubuntu.com/usn/USN-2591-1 https://access.redhat.com/security/cve/CVE-2015-3153 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153 https://kc.mcafee.com/corporate/index?page=content&id=SB10131 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2591-1
|
| curl | CVE-2016-8615 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94096 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8615 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615 https://curl.haxx.se/CVE-2016-8615.patch https://curl.haxx.se/docs/adv_20161102A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615 https://linux.oracle.com/cve/CVE-2016-8615.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8617 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94097 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8617 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617 https://curl.haxx.se/CVE-2016-8617.patch https://curl.haxx.se/docs/adv_20161102C.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617 https://linux.oracle.com/cve/CVE-2016-8617.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8618 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94098 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8618 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618 https://curl.haxx.se/docs/adv_20161102D.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618 https://linux.oracle.com/cve/CVE-2016-8618.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8619 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94100 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8619 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619 https://curl.haxx.se/CVE-2016-8619.patch https://curl.haxx.se/docs/adv_20161102E.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619 https://linux.oracle.com/cve/CVE-2016-8619.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8624 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94103 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8624 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624 https://curl.haxx.se/docs/adv_20161102J.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624 https://linux.oracle.com/cve/CVE-2016-8624.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8625 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.securityfocus.com/bid/94107 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8625 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625 https://curl.haxx.se/CVE-2016-8625.patch https://curl.haxx.se/docs/adv_20161102K.html https://linux.oracle.com/cve/CVE-2016-8625.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2017-1000254 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.debian.org/security/2017/dsa-3992 http://www.securityfocus.com/bid/101115 http://www.securitytracker.com/id/1039509 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000254 https://curl.haxx.se/673d0cd8.patch https://curl.haxx.se/docs/adv_20171004.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201712-04 https://support.apple.com/HT208331 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| curl | CVE-2017-8817 | MEDIUM | 7.29.0-54.el7 | | Expand...http://security.cucumberlinux.com/security/details.php?id=162 http://www.securityfocus.com/bid/102057 http://www.securitytracker.com/id/1039897 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-8817 https://curl.haxx.se/docs/adv_2017-ae72.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817 https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html https://security.gentoo.org/glsa/201712-04 https://ubuntu.com/security/notices/USN-3498-1 https://ubuntu.com/security/notices/USN-3498-2 https://www.debian.org/security/2017/dsa-4051
|
| curl | CVE-2019-5482 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html https://access.redhat.com/security/cve/CVE-2019-5482 https://curl.haxx.se/docs/CVE-2019-5482.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482 https://linux.oracle.com/cve/CVE-2019-5482.html https://linux.oracle.com/errata/ELSA-2020-5562.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20191004-0003/ https://security.netapp.com/advisory/ntap-20200416-0003/ https://ubuntu.com/security/notices/USN-4129-1 https://ubuntu.com/security/notices/USN-4129-2 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
| curl | CVE-2020-8177 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7_9.1 | Expand...https://access.redhat.com/security/cve/CVE-2020-8177 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.haxx.se/docs/CVE-2020-8177.html https://curl.se/docs/CVE-2020-8177.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177 https://hackerone.com/reports/887462 https://linux.oracle.com/cve/CVE-2020-8177.html https://linux.oracle.com/errata/ELSA-2020-5002.html https://nvd.nist.gov/vuln/detail/CVE-2020-8177 https://ubuntu.com/security/notices/USN-4402-1 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com/security-alerts/cpujan2022.html
|
| curl | CVE-2020-8284 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8284 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2020-8284.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284 https://hackerone.com/reports/1040166 https://linux.oracle.com/cve/CVE-2020-8284.html https://linux.oracle.com/errata/ELSA-2021-1610.html https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ https://nvd.nist.gov/vuln/detail/CVE-2020-8284 https://security.gentoo.org/glsa/202012-14 https://security.netapp.com/advisory/ntap-20210122-0007/ https://support.apple.com/kb/HT212325 https://support.apple.com/kb/HT212326 https://support.apple.com/kb/HT212327 https://ubuntu.com/security/notices/USN-4665-1 https://ubuntu.com/security/notices/USN-4665-2 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| curl | CVE-2020-8285 | MEDIUM | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2021/Apr/51 https://access.redhat.com/security/cve/CVE-2020-8285 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2020-8285.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285 https://github.com/curl/curl/issues/6255 https://hackerone.com/reports/1045844 https://linux.oracle.com/cve/CVE-2020-8285.html https://linux.oracle.com/errata/ELSA-2021-1610.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ https://nvd.nist.gov/vuln/detail/CVE-2020-8285 https://security.gentoo.org/glsa/202012-14 https://security.netapp.com/advisory/ntap-20210122-0007/ https://support.apple.com/kb/HT212325 https://support.apple.com/kb/HT212326 https://support.apple.com/kb/HT212327 https://ubuntu.com/security/notices/USN-4665-1 https://ubuntu.com/security/notices/USN-4665-2 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| curl | CVE-2021-22876 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-22876 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22876.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876 https://errata.almalinux.org/8/ALSA-2021-4511.html https://hackerone.com/reports/1101882 https://linux.oracle.com/cve/CVE-2021-22876.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ https://security.gentoo.org/glsa/202105-36 https://security.netapp.com/advisory/ntap-20210521-0007/ https://ubuntu.com/security/notices/USN-4898-1 https://ubuntu.com/security/notices/USN-4903-1 https://www.oracle.com//security-alerts/cpujul2021.html
|
| curl | CVE-2021-22924 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-22924 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf https://curl.se/docs/CVE-2021-22924.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://hackerone.com/reports/1223565 https://linux.oracle.com/cve/CVE-2021-22924.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22924 https://security.netapp.com/advisory/ntap-20210902-0003/ https://ubuntu.com/security/notices/USN-5021-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl | CVE-2021-22946 | MEDIUM | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json https://access.redhat.com/security/cve/CVE-2021-22946 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22946 https://security.netapp.com/advisory/ntap-20211029-0003/ https://security.netapp.com/advisory/ntap-20220121-0008/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl | CVE-2021-22947 | MEDIUM | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json https://access.redhat.com/security/cve/CVE-2021-22947 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22947.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 https://hackerone.com/reports/1334763 https://launchpad.net/bugs/1944120 (regression bug) https://linux.oracle.com/cve/CVE-2021-22947.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22947 https://security.netapp.com/advisory/ntap-20211029-0003/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://ubuntu.com/security/notices/USN-5079-3 https://ubuntu.com/security/notices/USN-5079-4 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl | CVE-2022-27774 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27774 https://curl.se/docs/CVE-2022-27774.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://hackerone.com/reports/1543773 https://nvd.nist.gov/vuln/detail/CVE-2022-27774 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27776 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27776 https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 https://hackerone.com/reports/1547048 https://nvd.nist.gov/vuln/detail/CVE-2022-27776 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
| curl | CVE-2022-27778 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27778 https://hackerone.com/reports/1553598 https://nvd.nist.gov/vuln/detail/CVE-2022-27778 https://security.netapp.com/advisory/ntap-20220609-0009/
|
| curl | CVE-2022-27779 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27779 https://hackerone.com/reports/1553301 https://nvd.nist.gov/vuln/detail/CVE-2022-27779 https://security.netapp.com/advisory/ntap-20220609-0009/
|
| curl | CVE-2022-27780 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27780 https://curl.se/docs/CVE-2022-27780.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780 https://hackerone.com/reports/1553841 https://nvd.nist.gov/vuln/detail/CVE-2022-27780 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
| curl | CVE-2022-27782 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27782 https://curl.se/docs/CVE-2022-27782.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://hackerone.com/reports/1555796 https://nvd.nist.gov/vuln/detail/CVE-2022-27782 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
| curl | CVE-2022-30115 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-30115 https://hackerone.com/reports/1557449 https://nvd.nist.gov/vuln/detail/CVE-2022-30115 https://security.netapp.com/advisory/ntap-20220609-0009/
|
| curl | CVE-2016-0755 | LOW | 7.29.0-54.el7 | | Expand...http://curl.haxx.se/docs/adv_20160127A.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html http://www.debian.org/security/2016/dsa-3455 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/82307 http://www.securitytracker.com/id/1034882 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965 http://www.ubuntu.com/usn/USN-2882-1 https://access.redhat.com/security/cve/CVE-2016-0755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755 https://security.gentoo.org/glsa/201701-47 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-2882-1
|
| curl | CVE-2016-8616 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94094 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8616 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616 https://curl.haxx.se/CVE-2016-8616.patch https://curl.haxx.se/docs/adv_20161102B.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616 https://linux.oracle.com/cve/CVE-2016-8616.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8621 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94101 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8621 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621 https://curl.haxx.se/CVE-2016-8621.patch https://curl.haxx.se/docs/adv_20161102G.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621 https://linux.oracle.com/cve/CVE-2016-8621.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8622 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94105 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8622 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622 https://curl.haxx.se/docs/adv_20161102H.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622 https://linux.oracle.com/cve/CVE-2016-8622.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-8623 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94106 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623 https://curl.haxx.se/CVE-2016-8623.patch https://curl.haxx.se/docs/adv_20161102I.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623 https://linux.oracle.com/cve/CVE-2016-8623.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| curl | CVE-2016-9586 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/95019 http://www.securitytracker.com/id/1037515 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-9586 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586 https://curl.haxx.se/docs/adv_20161221A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586 https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| curl | CVE-2017-1000100 | LOW | 7.29.0-54.el7 | | Expand...http://www.debian.org/security/2017/dsa-3992 http://www.securityfocus.com/bid/100286 http://www.securitytracker.com/id/1039118 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000100 https://curl.haxx.se/docs/adv_20170809B.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100 https://security.gentoo.org/glsa/201709-14 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| curl | CVE-2017-7407 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-7407 https://curl.haxx.se/docs/adv_20170403.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407 https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 https://security.gentoo.org/glsa/201709-14 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| curl | CVE-2018-20483 | LOW | 7.29.0-54.el7 | | Expand...http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS http://www.securityfocus.com/bid/106358 https://access.redhat.com/errata/RHSA-2019:3701 https://access.redhat.com/security/cve/CVE-2018-20483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483 https://linux.oracle.com/cve/CVE-2018-20483.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://security.gentoo.org/glsa/201903-08 https://security.netapp.com/advisory/ntap-20190321-0002/ https://twitter.com/marcan42/status/1077676739877232640 https://ubuntu.com/security/notices/USN-3943-1 https://usn.ubuntu.com/3943-1/
|
| curl | CVE-2019-5436 | LOW | 7.29.0-54.el7 | 7.29.0-57.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html http://www.openwall.com/lists/oss-security/2019/09/11/6 https://access.redhat.com/security/cve/CVE-2019-5436 https://curl.haxx.se/docs/CVE-2019-5436.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436 https://linux.oracle.com/cve/CVE-2019-5436.html https://linux.oracle.com/errata/ELSA-2020-1792.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20190606-0004/ https://support.f5.com/csp/article/K55133295 https://support.f5.com/csp/article/K55133295?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-3993-1 https://ubuntu.com/security/notices/USN-3993-2 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| curl | CVE-2020-8231 | LOW | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8231 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.haxx.se/docs/CVE-2020-8231.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231 https://hackerone.com/reports/948876 https://linux.oracle.com/cve/CVE-2020-8231.html https://linux.oracle.com/errata/ELSA-2021-1610.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-8231 https://security.gentoo.org/glsa/202012-14 https://ubuntu.com/security/notices/USN-4466-1 https://ubuntu.com/security/notices/USN-4466-2 https://ubuntu.com/security/notices/USN-4665-1 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| curl | CVE-2021-22898 | LOW | 7.29.0-54.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4 https://access.redhat.com/security/cve/CVE-2021-22898 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22898.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898 https://errata.almalinux.org/8/ALSA-2021-4511.html https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 https://linux.oracle.com/cve/CVE-2021-22898.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://nvd.nist.gov/vuln/detail/CVE-2021-22898 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| curl | CVE-2021-22925 | LOW | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json https://access.redhat.com/security/cve/CVE-2021-22925 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://curl.se/docs/CVE-2021-22925.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925 https://errata.almalinux.org/8/ALSA-2021-4511.html https://hackerone.com/reports/1223882 https://linux.oracle.com/cve/CVE-2021-22925.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22925 https://security.netapp.com/advisory/ntap-20210902-0003/ https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| curl | CVE-2022-27781 | LOW | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27781 https://curl.se/docs/CVE-2022-27781.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://github.com/curl/curl/commit/f6c335d63f https://hackerone.com/reports/1555441 https://nvd.nist.gov/vuln/detail/CVE-2022-27781 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
| cyrus-sasl-lib | CVE-2022-24407 | HIGH | 2.1.26-23.el7 | 2.1.26-24.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/02/23/4 https://access.redhat.com/security/cve/CVE-2022-24407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407 https://github.com/cyrusimap/cyrus-sasl/blob/fdcd13ceaef8de684dc69008011fa865c5b4a3ac/docsrc/sasl/release-notes/2.1/index.rst https://linux.oracle.com/cve/CVE-2022-24407.html https://linux.oracle.com/errata/ELSA-2022-9239.html https://lists.debian.org/debian-lts-announce/2022/03/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FIXU75Q6RBNK6UYM7MQ3TCFGXR7AX4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H26R4SMGM3WHXX4XYNNJB4YGFIL5UNF4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZZC6BMPI3V3MC2IGNLN377ETUWO7QBIH/ https://nvd.nist.gov/vuln/detail/CVE-2022-24407 https://ubuntu.com/security/notices/USN-5301-1 https://ubuntu.com/security/notices/USN-5301-2 https://www.cyrusimap.org/sasl/sasl/release-notes/2.1/index.html#new-in-2-1-28 https://www.debian.org/security/2022/dsa-5087
|
| cyrus-sasl-lib | CVE-2019-19906 | MEDIUM | 2.1.26-23.el7 | | Expand...http://seclists.org/fulldisclosure/2020/Jul/23 http://seclists.org/fulldisclosure/2020/Jul/24 http://www.openwall.com/lists/oss-security/2022/02/23/4 https://access.redhat.com/security/cve/CVE-2019-19906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19906 https://github.com/cyrusimap/cyrus-sasl/issues/587 https://linux.oracle.com/cve/CVE-2019-19906.html https://linux.oracle.com/errata/ELSA-2020-4497.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/12/msg00027.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MW6GZCLECGL2PBNHVNPJIX4RPVRVFR7R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OB4GSVOJ6ESHQNT5GSV63OX5D4KPSTGT/ https://nvd.nist.gov/vuln/detail/CVE-2019-19906 https://seclists.org/bugtraq/2019/Dec/42 https://support.apple.com/kb/HT211288 https://support.apple.com/kb/HT211289 https://ubuntu.com/security/notices/USN-4256-1 https://usn.ubuntu.com/4256-1/ https://www.debian.org/security/2019/dsa-4591 https://www.openldap.org/its/index.cgi/Incoming?id=9123
|
| dbus | CVE-2020-12049 | HIGH | 1:1.10.24-13.el7_6 | 1:1.10.24-14.el7_8 | Expand...http://www.openwall.com/lists/oss-security/2020/06/04/3 https://access.redhat.com/security/cve/CVE-2020-12049 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049 https://gitlab.freedesktop.org/dbus/dbus/-/issues/294 https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30 https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18 https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16 https://linux.oracle.com/cve/CVE-2020-12049.html https://linux.oracle.com/errata/ELSA-2020-3014.html https://security.gentoo.org/glsa/202007-46 https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak https://ubuntu.com/security/notices/USN-4398-1 https://ubuntu.com/security/notices/USN-4398-2 https://usn.ubuntu.com/4398-1/ https://usn.ubuntu.com/4398-2/
|
| dbus | CVE-2014-3477 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0266.html http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567 http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://seclists.org/oss-sec/2014/q2/509 http://secunia.com/advisories/59428 http://secunia.com/advisories/59611 http://secunia.com/advisories/59798 http://www.debian.org/security/2014/dsa-2971 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.securityfocus.com/bid/67986 https://access.redhat.com/security/cve/CVE-2014-3477 https://bugs.freedesktop.org/show_bug.cgi?id=78979 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477 https://ubuntu.com/security/notices/USN-2275-1
|
| dbus | CVE-2014-3532 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0294.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://openwall.com/lists/oss-security/2014/07/02/4 http://secunia.com/advisories/59611 http://secunia.com/advisories/59798 http://secunia.com/advisories/60236 http://www.debian.org/security/2014/dsa-2971 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html https://access.redhat.com/security/cve/CVE-2014-3532 https://bugs.freedesktop.org/show_bug.cgi?id=80163 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532 https://ubuntu.com/security/notices/USN-2275-1
|
| dbus | CVE-2014-3533 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0294.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://openwall.com/lists/oss-security/2014/07/02/4 http://secunia.com/advisories/59611 http://secunia.com/advisories/59798 http://secunia.com/advisories/60236 http://www.debian.org/security/2014/dsa-2971 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html https://access.redhat.com/security/cve/CVE-2014-3533 https://bugs.freedesktop.org/show_bug.cgi?id=79694 https://bugs.freedesktop.org/show_bug.cgi?id=80469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533 https://ubuntu.com/security/notices/USN-2275-1
|
| dbus | CVE-2014-3635 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3635 https://bugs.freedesktop.org/show_bug.cgi?id=83622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus | CVE-2019-12749 | MEDIUM | 1:1.10.24-13.el7_6 | 1:1.10.24-15.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html http://www.openwall.com/lists/oss-security/2019/06/11/2 http://www.securityfocus.com/bid/108751 https://access.redhat.com/errata/RHSA-2019:1726 https://access.redhat.com/errata/RHSA-2019:2868 https://access.redhat.com/errata/RHSA-2019:2870 https://access.redhat.com/errata/RHSA-2019:3707 https://access.redhat.com/security/cve/CVE-2019-12749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749 https://linux.oracle.com/cve/CVE-2019-12749.html https://linux.oracle.com/errata/ELSA-2020-4032.html https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/ https://nvd.nist.gov/vuln/detail/CVE-2019-12749 https://seclists.org/bugtraq/2019/Jun/16 https://security.gentoo.org/glsa/201909-08 https://ubuntu.com/security/notices/USN-4015-1 https://ubuntu.com/security/notices/USN-4015-2 https://usn.ubuntu.com/4015-1/ https://usn.ubuntu.com/4015-2/ https://www.debian.org/security/2019/dsa-4462 https://www.openwall.com/lists/oss-security/2019/06/11/2
|
| dbus | CVE-2014-3636 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3636 https://bugs.freedesktop.org/show_bug.cgi?id=82820 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus | CVE-2014-3637 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.openwall.com/lists/oss-security/2019/06/24/13 http://www.openwall.com/lists/oss-security/2019/06/24/14 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3637 https://bugs.freedesktop.org/show_bug.cgi?id=80559 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus | CVE-2014-3638 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://secunia.com/advisories/61431 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3638 https://bugs.freedesktop.org/show_bug.cgi?id=81053 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus | CVE-2014-3639 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://secunia.com/advisories/61431 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3639 https://bugs.freedesktop.org/show_bug.cgi?id=80919 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus | CVE-2015-0245 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2015-0071.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html http://www.debian.org/security/2015/dsa-3161 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2015/02/09/6 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html https://access.redhat.com/security/cve/CVE-2015-0245 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245 https://ubuntu.com/security/notices/USN-3116-1
|
| dbus | CVE-2020-35512 | LOW | 1:1.10.24-13.el7_6 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
| dbus-libs | CVE-2020-12049 | HIGH | 1:1.10.24-13.el7_6 | 1:1.10.24-14.el7_8 | Expand...http://www.openwall.com/lists/oss-security/2020/06/04/3 https://access.redhat.com/security/cve/CVE-2020-12049 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12049 https://gitlab.freedesktop.org/dbus/dbus/-/issues/294 https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.10.30 https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.12.18 https://gitlab.freedesktop.org/dbus/dbus/-/tags/dbus-1.13.16 https://linux.oracle.com/cve/CVE-2020-12049.html https://linux.oracle.com/errata/ELSA-2020-3014.html https://security.gentoo.org/glsa/202007-46 https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak https://ubuntu.com/security/notices/USN-4398-1 https://ubuntu.com/security/notices/USN-4398-2 https://usn.ubuntu.com/4398-1/ https://usn.ubuntu.com/4398-2/
|
| dbus-libs | CVE-2014-3477 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0266.html http://cgit.freedesktop.org/dbus/dbus/commit/?h=dbus-1.8&id=24c590703ca47eb71ddef453de43126b90954567 http://lists.opensuse.org/opensuse-updates/2014-06/msg00042.html http://lists.opensuse.org/opensuse-updates/2014-07/msg00012.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://seclists.org/oss-sec/2014/q2/509 http://secunia.com/advisories/59428 http://secunia.com/advisories/59611 http://secunia.com/advisories/59798 http://www.debian.org/security/2014/dsa-2971 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.securityfocus.com/bid/67986 https://access.redhat.com/security/cve/CVE-2014-3477 https://bugs.freedesktop.org/show_bug.cgi?id=78979 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477 https://ubuntu.com/security/notices/USN-2275-1
|
| dbus-libs | CVE-2014-3532 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0294.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://openwall.com/lists/oss-security/2014/07/02/4 http://secunia.com/advisories/59611 http://secunia.com/advisories/59798 http://secunia.com/advisories/60236 http://www.debian.org/security/2014/dsa-2971 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html https://access.redhat.com/security/cve/CVE-2014-3532 https://bugs.freedesktop.org/show_bug.cgi?id=80163 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532 https://ubuntu.com/security/notices/USN-2275-1
|
| dbus-libs | CVE-2014-3533 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0294.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://openwall.com/lists/oss-security/2014/07/02/4 http://secunia.com/advisories/59611 http://secunia.com/advisories/59798 http://secunia.com/advisories/60236 http://www.debian.org/security/2014/dsa-2971 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html https://access.redhat.com/security/cve/CVE-2014-3533 https://bugs.freedesktop.org/show_bug.cgi?id=79694 https://bugs.freedesktop.org/show_bug.cgi?id=80469 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533 https://ubuntu.com/security/notices/USN-2275-1
|
| dbus-libs | CVE-2014-3635 | MEDIUM | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3635 https://bugs.freedesktop.org/show_bug.cgi?id=83622 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus-libs | CVE-2019-12749 | MEDIUM | 1:1.10.24-13.el7_6 | 1:1.10.24-15.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00092.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00026.html http://www.openwall.com/lists/oss-security/2019/06/11/2 http://www.securityfocus.com/bid/108751 https://access.redhat.com/errata/RHSA-2019:1726 https://access.redhat.com/errata/RHSA-2019:2868 https://access.redhat.com/errata/RHSA-2019:2870 https://access.redhat.com/errata/RHSA-2019:3707 https://access.redhat.com/security/cve/CVE-2019-12749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12749 https://linux.oracle.com/cve/CVE-2019-12749.html https://linux.oracle.com/errata/ELSA-2020-4032.html https://lists.debian.org/debian-lts-announce/2019/06/msg00005.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V2CQF37O73VH2JDVX2ILX2KD2KLXLQOU/ https://nvd.nist.gov/vuln/detail/CVE-2019-12749 https://seclists.org/bugtraq/2019/Jun/16 https://security.gentoo.org/glsa/201909-08 https://ubuntu.com/security/notices/USN-4015-1 https://ubuntu.com/security/notices/USN-4015-2 https://usn.ubuntu.com/4015-1/ https://usn.ubuntu.com/4015-2/ https://www.debian.org/security/2019/dsa-4462 https://www.openwall.com/lists/oss-security/2019/06/11/2
|
| dbus-libs | CVE-2014-3636 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3636 https://bugs.freedesktop.org/show_bug.cgi?id=82820 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus-libs | CVE-2014-3637 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.openwall.com/lists/oss-security/2019/06/24/13 http://www.openwall.com/lists/oss-security/2019/06/24/14 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3637 https://bugs.freedesktop.org/show_bug.cgi?id=80559 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus-libs | CVE-2014-3638 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://secunia.com/advisories/61431 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3638 https://bugs.freedesktop.org/show_bug.cgi?id=81053 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus-libs | CVE-2014-3639 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2014-0395.html http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00026.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00049.html http://secunia.com/advisories/61378 http://secunia.com/advisories/61431 http://www.debian.org/security/2014/dsa-3026 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2014/09/16/9 http://www.securitytracker.com/id/1030864 http://www.ubuntu.com/usn/USN-2352-1 https://access.redhat.com/security/cve/CVE-2014-3639 https://bugs.freedesktop.org/show_bug.cgi?id=80919 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639 https://ubuntu.com/security/notices/USN-2352-1
|
| dbus-libs | CVE-2015-0245 | LOW | 1:1.10.24-13.el7_6 | | Expand...http://advisories.mageia.org/MGASA-2015-0071.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00066.html http://www.debian.org/security/2015/dsa-3161 http://www.mandriva.com/security/advisories?name=MDVSA-2015:176 http://www.openwall.com/lists/oss-security/2015/02/09/6 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html https://access.redhat.com/security/cve/CVE-2015-0245 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245 https://ubuntu.com/security/notices/USN-3116-1
|
| dbus-libs | CVE-2020-35512 | LOW | 1:1.10.24-13.el7_6 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35512 https://bugs.gentoo.org/755392 https://bugzilla.redhat.com/show_bug.cgi?id=1909101 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35512 https://gitlab.freedesktop.org/dbus/dbus/-/commit/2b7948ef907669e844b52c4fa2268d6e3162a70c (dbus-1.13.18) https://gitlab.freedesktop.org/dbus/dbus/-/commit/dc94fe3d31adf72259adc31f343537151a6c0bdd (dbus-1.10.32) https://gitlab.freedesktop.org/dbus/dbus/-/commit/f3b2574f0c9faa32a59efec905921f7ef4438a60 (dbus-1.12.20) https://gitlab.freedesktop.org/dbus/dbus/-/issues/305 https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128 https://security-tracker.debian.org/tracker/CVE-2020-35512 https://ubuntu.com/security/notices/USN-5244-1 https://ubuntu.com/security/notices/USN-5244-2
|
| device-mapper | CVE-2020-8991 | LOW | 7:1.02.158-2.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8991 https://sourceware.org/git/?p=lvm2.git;a=commit;h=bcf9556b8fcd16ad8997f80cc92785f295c66701
|
| device-mapper-libs | CVE-2020-8991 | LOW | 7:1.02.158-2.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8991 https://sourceware.org/git/?p=lvm2.git;a=commit;h=bcf9556b8fcd16ad8997f80cc92785f295c66701
|
| dracut | CVE-2016-4484 | MEDIUM | 033-564.el7 | | Expand...http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html http://www.openwall.com/lists/oss-security/2016/11/14/13 http://www.openwall.com/lists/oss-security/2016/11/15/1 http://www.openwall.com/lists/oss-security/2016/11/15/4 http://www.openwall.com/lists/oss-security/2016/11/16/6 http://www.securityfocus.com/bid/94315 https://access.redhat.com/articles/2786581 https://access.redhat.com/security/cve/CVE-2016-4484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4484 https://gitlab.com/cryptsetup/cryptsetup/commit/ef8a7d82d8d3716ae9b58179590f7908981fa0cb
|
| elfutils-default-yama-scope | CVE-2016-10254 | LOW | 0.176-2.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2 https://access.redhat.com/security/cve/CVE-2016-10254 https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254 https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/ https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2016-10255 | LOW | 0.176-2.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1 https://access.redhat.com/security/cve/CVE-2016-10255 https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ https://bugzilla.redhat.com/show_bug.cgi?id=1387584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255 https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/ https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2017-7607 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html http://www.securityfocus.com/bid/98608 https://access.redhat.com/security/cve/CVE-2017-7607 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607 https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2017-7608 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html http://www.securityfocus.com/bid/98609 https://access.redhat.com/security/cve/CVE-2017-7608 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2017-7609 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7609 https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609 https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2017-7610 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7610 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2017-7611 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7611 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2017-7612 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7612 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-default-yama-scope | CVE-2017-7613 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7613 https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2016-10254 | LOW | 0.176-2.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2 https://access.redhat.com/security/cve/CVE-2016-10254 https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254 https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/ https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2016-10255 | LOW | 0.176-2.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1 https://access.redhat.com/security/cve/CVE-2016-10255 https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ https://bugzilla.redhat.com/show_bug.cgi?id=1387584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255 https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/ https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2017-7607 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html http://www.securityfocus.com/bid/98608 https://access.redhat.com/security/cve/CVE-2017-7607 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607 https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2017-7608 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html http://www.securityfocus.com/bid/98609 https://access.redhat.com/security/cve/CVE-2017-7608 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2017-7609 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7609 https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609 https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2017-7610 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7610 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2017-7611 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7611 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2017-7612 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7612 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libelf | CVE-2017-7613 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7613 https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2016-10254 | LOW | 0.176-2.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/03/22/2 https://access.redhat.com/security/cve/CVE-2016-10254 https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-allocate_elf-common-h/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10254 https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/message/EJWVY7TMRDEMWPAPNVU3V4MZYG5HANF2/ https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2016-10255 | LOW | 0.176-2.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/03/22/1 https://access.redhat.com/security/cve/CVE-2016-10255 https://blogs.gentoo.org/ago/2016/11/04/elfutils-memory-allocation-failure-in-__libelf_set_rawdata_wrlock-elf_getdata-c/ https://bugzilla.redhat.com/show_bug.cgi?id=1387584 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10255 https://lists.fedorahosted.org/archives/list/elfutils-devel@lists.fedorahosted.org/thread/Q4LE47FPEVRZANMV6JE2NMHYO4H5MHGJ/ https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2017-7607 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html http://www.securityfocus.com/bid/98608 https://access.redhat.com/security/cve/CVE-2017-7607 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-handle_gnu_hash-readelf-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7607 https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2017-7608 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html http://www.securityfocus.com/bid/98609 https://access.redhat.com/security/cve/CVE-2017-7608 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-ebl_object_note_type_name-eblobjnotetypename-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7608 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2017-7609 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7609 https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-__libelf_decompress-elf_compress-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7609 https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2017-7610 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7610 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_group-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7610 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2017-7611 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7611 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_symtab_shndx-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7611 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2017-7612 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7612 https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-heap-based-buffer-overflow-in-check_sysv_hash-elflint-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7612 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| elfutils-libs | CVE-2017-7613 | LOW | 0.176-2.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html https://access.redhat.com/security/cve/CVE-2017-7613 https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c https://blogs.gentoo.org/ago/2017/04/03/elfutils-memory-allocation-failure-in-xcalloc-xmalloc-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7613 https://lists.debian.org/debian-lts-announce/2019/02/msg00036.html https://security.gentoo.org/glsa/201710-10 https://ubuntu.com/security/notices/USN-3670-1 https://usn.ubuntu.com/3670-1/
|
| expat | CVE-2022-25235 | HIGH | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25235 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235 https://github.com/libexpat/libexpat/pull/562 https://github.com/libexpat/libexpat/pull/562/commits/367ae600b48d74261bbc339b17e9318424049791 (fix) https://github.com/libexpat/libexpat/pull/562/commits/97cfdc3fa7dca759880d81e371901f4620279106 (tests) https://linux.oracle.com/cve/CVE-2022-25235.html https://linux.oracle.com/errata/ELSA-2022-9359.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25235 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| expat | CVE-2022-25236 | HIGH | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://packetstormsecurity.com/files/167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25236 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236 https://github.com/libexpat/libexpat/pull/561 https://github.com/libexpat/libexpat/pull/561/commits/2de077423fb22750ebea599677d523b53cb93b1d (test) https://github.com/libexpat/libexpat/pull/561/commits/a2fe525e660badd64b6c557c2b1ec26ddc07f6e4 (fix) https://github.com/libexpat/libexpat/pull/577 https://linux.oracle.com/cve/CVE-2022-25236.html https://linux.oracle.com/errata/ELSA-2022-9359.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25236 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| expat | CVE-2022-25315 | HIGH | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25315 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315 https://github.com/libexpat/libexpat/pull/559 https://linux.oracle.com/cve/CVE-2022-25315.html https://linux.oracle.com/errata/ELSA-2022-9359.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25315 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| expat | CVE-2012-6702 | MEDIUM | 2.1.0-10.el7_3 | | Expand...http://seclists.org/oss-sec/2016/q2/468 http://www.debian.org/security/2016/dsa-3597 http://www.openwall.com/lists/oss-security/2016/06/03/8 http://www.openwall.com/lists/oss-security/2016/06/04/1 http://www.securityfocus.com/bid/91483 http://www.ubuntu.com/usn/USN-3010-1 https://access.redhat.com/security/cve/CVE-2012-6702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6702 https://security.gentoo.org/glsa/201701-21 https://source.android.com/security/bulletin/2016-11-01.html https://ubuntu.com/security/notices/USN-3010-1 https://ubuntu.com/security/notices/USN-3013-1 https://www.tenable.com/security/tns-2016-20
|
| expat | CVE-2013-0340 | MEDIUM | 2.1.0-10.el7_3 | | Expand...http://openwall.com/lists/oss-security/2013/02/22/3 http://seclists.org/fulldisclosure/2021/Oct/61 http://seclists.org/fulldisclosure/2021/Oct/62 http://seclists.org/fulldisclosure/2021/Oct/63 http://seclists.org/fulldisclosure/2021/Sep/33 http://seclists.org/fulldisclosure/2021/Sep/34 http://seclists.org/fulldisclosure/2021/Sep/35 http://seclists.org/fulldisclosure/2021/Sep/38 http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 http://securitytracker.com/id?1028213 http://www.openwall.com/lists/oss-security/2013/04/12/6 http://www.openwall.com/lists/oss-security/2021/10/07/4 http://www.osvdb.org/90634 http://www.securityfocus.com/bid/58233 https://access.redhat.com/security/cve/CVE-2013-0340 https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702@%3Cusers.openoffice.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2013-0340 https://security.gentoo.org/glsa/201701-21 https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://support.apple.com/kb/HT212807 https://support.apple.com/kb/HT212814 https://support.apple.com/kb/HT212815 https://support.apple.com/kb/HT212819
|
| expat | CVE-2015-2716 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-11.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html http://rhn.redhat.com/errata/RHSA-2015-0988.html http://rhn.redhat.com/errata/RHSA-2015-1012.html http://www.debian.org/security/2015/dsa-3260 http://www.debian.org/security/2015/dsa-3264 http://www.mozilla.org/security/announce/2015/mfsa2015-54.html http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/74611 http://www.ubuntu.com/usn/USN-2602-1 http://www.ubuntu.com/usn/USN-2603-1 https://access.redhat.com/security/cve/CVE-2015-2716 https://bugzilla.mozilla.org/show_bug.cgi?id=1140537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716 https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2015-2716.html https://linux.oracle.com/errata/ELSA-2020-1011.html https://security.gentoo.org/glsa/201605-06 https://ubuntu.com/security/notices/USN-2602-1 https://ubuntu.com/security/notices/USN-2603-1 https://www.mozilla.org/en-US/security/advisories/mfsa2015-54/ https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7 https://www.tenable.com/security/tns-2016-20
|
| expat | CVE-2016-4472 | MEDIUM | 2.1.0-10.el7_3 | | Expand...http://www.securityfocus.com/bid/91528 http://www.ubuntu.com/usn/USN-3013-1 https://access.redhat.com/security/cve/CVE-2016-4472 https://bugzilla.redhat.com/show_bug.cgi?id=1344251 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4472 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://security.gentoo.org/glsa/201701-21 https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde https://ubuntu.com/security/notices/USN-3013-1 https://www.tenable.com/security/tns-2016-20
|
| expat | CVE-2016-5300 | MEDIUM | 2.1.0-10.el7_3 | | Expand...http://seclists.org/oss-sec/2016/q2/468 http://www.debian.org/security/2016/dsa-3597 http://www.openwall.com/lists/oss-security/2016/06/04/4 http://www.openwall.com/lists/oss-security/2016/06/04/5 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91159 http://www.ubuntu.com/usn/USN-3010-1 https://access.redhat.com/security/cve/CVE-2016-5300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5300 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-21 https://source.android.com/security/bulletin/2016-11-01.html https://ubuntu.com/security/notices/USN-3010-1 https://ubuntu.com/security/notices/USN-3013-1 https://www.tenable.com/security/tns-2016-20
|
| expat | CVE-2017-9233 | MEDIUM | 2.1.0-10.el7_3 | | Expand...http://www.debian.org/security/2017/dsa-3898 http://www.openwall.com/lists/oss-security/2017/06/17/7 http://www.securityfocus.com/bid/99276 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-9233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9233 https://github.com/libexpat/libexpat/blob/master/expat/Changes https://libexpat.github.io/doc/cve-2017-9233/ https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://support.apple.com/HT208112 https://support.apple.com/HT208113 https://support.apple.com/HT208115 https://support.apple.com/HT208144 https://support.f5.com/csp/article/K03244804 https://ubuntu.com/security/notices/USN-3356-1 https://ubuntu.com/security/notices/USN-3356-2
|
| expat | CVE-2018-20843 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-12.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00039.html https://access.redhat.com/security/cve/CVE-2018-20843 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5226 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931031 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843 https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes https://github.com/libexpat/libexpat/issues/186 https://github.com/libexpat/libexpat/pull/262 https://github.com/libexpat/libexpat/pull/262/commits/11f8838bf99ea0a6f0b76f9760c43704d00c4ff6 https://linux.oracle.com/cve/CVE-2018-20843.html https://linux.oracle.com/errata/ELSA-2020-4484.html https://lists.debian.org/debian-lts-announce/2019/06/msg00028.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEJJSQSG3KSUQY4FPVHZ7ZTT7FORMFVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDAUGEB3TUP6NEKJDBUBZX7N5OAUOOOK/ https://nvd.nist.gov/vuln/detail/CVE-2018-20843 https://seclists.org/bugtraq/2019/Jun/39 https://security.gentoo.org/glsa/201911-08 https://security.netapp.com/advisory/ntap-20190703-0001/ https://support.f5.com/csp/article/K51011533 https://ubuntu.com/security/notices/USN-4040-1 https://ubuntu.com/security/notices/USN-4040-2 https://usn.ubuntu.com/4040-1/ https://usn.ubuntu.com/4040-2/ https://www.debian.org/security/2019/dsa-4472 https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-11
|
| expat | CVE-2021-45960 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2021-45960 https://bugzilla.mozilla.org/show_bug.cgi?id=1217609 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960 https://github.com/libexpat/libexpat/issues/531 https://github.com/libexpat/libexpat/pull/534 https://github.com/libexpat/libexpat/pull/534/commits/0adcb34c49bee5b19bd29b16a578c510c23597ea https://linux.oracle.com/cve/CVE-2021-45960.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2021-45960 https://security.netapp.com/advisory/ntap-20220121-0004/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2021-46143 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2021-46143 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143 https://github.com/libexpat/libexpat/issues/532 https://github.com/libexpat/libexpat/pull/538 https://linux.oracle.com/cve/CVE-2021-46143.html https://linux.oracle.com/errata/ELSA-2022-9227.html https://nvd.nist.gov/vuln/detail/CVE-2021-46143 https://security.netapp.com/advisory/ntap-20220121-0006/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-22822 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22822 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22822.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22822 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-22823 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22823 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22823.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22823 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-22824 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22824 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22824.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22824 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-22825 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22825 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22825.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22825 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-22826 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22826 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22826.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22826 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-22827 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2022/01/17/3 https://access.redhat.com/security/cve/CVE-2022-22827 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827 https://github.com/libexpat/libexpat/pull/539 https://linux.oracle.com/cve/CVE-2022-22827.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://nvd.nist.gov/vuln/detail/CVE-2022-22827 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-23852 | MEDIUM | 2.1.0-10.el7_3 | 2.1.0-14.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2022-23852 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852 https://github.com/libexpat/libexpat/pull/550 https://linux.oracle.com/cve/CVE-2022-23852.html https://linux.oracle.com/errata/ELSA-2022-1069.html https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://nvd.nist.gov/vuln/detail/CVE-2022-23852 https://security.netapp.com/advisory/ntap-20220217-0001/ https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-05
|
| expat | CVE-2022-25313 | MEDIUM | 2.1.0-10.el7_3 | | Expand...http://www.openwall.com/lists/oss-security/2022/02/19/1 https://access.redhat.com/security/cve/CVE-2022-25313 https://blog.hartwork.org/posts/expat-2-4-5-released/ https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313 https://github.com/libexpat/libexpat/pull/558 https://lists.debian.org/debian-lts-announce/2022/03/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3UFRBA3UQVIQKXTBUQXDWQOVWNBKLERU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y27XO3JMKAOMQZVPS3B4MJGEAHCZF5OM/ https://nvd.nist.gov/vuln/detail/CVE-2022-25313 https://security.netapp.com/advisory/ntap-20220303-0008/ https://ubuntu.com/security/notices/USN-5320-1 https://www.debian.org/security/2022/dsa-5085 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| expat | CVE-2016-9063 | LOW | 2.1.0-10.el7_3 | | Expand...http://www.securityfocus.com/bid/94337 http://www.securitytracker.com/id/1037298 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2016-9063 https://bugzilla.mozilla.org/show_bug.cgi?id=1274777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063 https://ubuntu.com/security/notices/USN-3124-1 https://www.debian.org/security/2017/dsa-3898 https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/ https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9063 https://www.mozilla.org/security/advisories/mfsa2016-89/
|
| expat | CVE-2019-15903 | LOW | 2.1.0-10.el7_3 | 2.1.0-12.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00080.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00081.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html http://packetstormsecurity.com/files/154503/Slackware-Security-Advisory-expat-Updates.html http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html http://packetstormsecurity.com/files/154947/Slackware-Security-Advisory-mozilla-firefox-Updates.html http://seclists.org/fulldisclosure/2019/Dec/23 http://seclists.org/fulldisclosure/2019/Dec/26 http://seclists.org/fulldisclosure/2019/Dec/27 http://seclists.org/fulldisclosure/2019/Dec/30 https://access.redhat.com/errata/RHSA-2019:3210 https://access.redhat.com/errata/RHSA-2019:3237 https://access.redhat.com/errata/RHSA-2019:3756 https://access.redhat.com/security/cve/CVE-2019-15903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903 https://github.com/libexpat/libexpat/commit/c20b758c332d9a13afbbb276d30db1d183a85d43 https://github.com/libexpat/libexpat/issues/317 https://github.com/libexpat/libexpat/issues/342 https://github.com/libexpat/libexpat/pull/318 https://linux.oracle.com/cve/CVE-2019-15903.html https://linux.oracle.com/errata/ELSA-2020-4484.html https://lists.debian.org/debian-lts-announce/2019/11/msg00006.html https://lists.debian.org/debian-lts-announce/2019/11/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A4TZKPJFTURRLXIGLB34WVKQ5HGY6JJA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BDUTI5TVQWIGGQXPEVI4T2ENHFSBMIBP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S26LGXXQ7YF2BP3RGOWELBFKM6BHF6UG/ https://nvd.nist.gov/vuln/detail/CVE-2019-15903 https://seclists.org/bugtraq/2019/Dec/17 https://seclists.org/bugtraq/2019/Dec/21 https://seclists.org/bugtraq/2019/Dec/23 https://seclists.org/bugtraq/2019/Nov/1 https://seclists.org/bugtraq/2019/Nov/24 https://seclists.org/bugtraq/2019/Oct/29 https://seclists.org/bugtraq/2019/Sep/30 https://seclists.org/bugtraq/2019/Sep/37 https://security.gentoo.org/glsa/201911-08 https://security.netapp.com/advisory/ntap-20190926-0004/ https://support.apple.com/kb/HT210785 https://support.apple.com/kb/HT210788 https://support.apple.com/kb/HT210789 https://support.apple.com/kb/HT210790 https://support.apple.com/kb/HT210793 https://support.apple.com/kb/HT210794 https://support.apple.com/kb/HT210795 https://ubuntu.com/security/notices/USN-4132-1 https://ubuntu.com/security/notices/USN-4132-2 https://ubuntu.com/security/notices/USN-4165-1 https://ubuntu.com/security/notices/USN-4202-1 https://ubuntu.com/security/notices/USN-4335-1 https://usn.ubuntu.com/4132-1/ https://usn.ubuntu.com/4132-2/ https://usn.ubuntu.com/4165-1/ https://usn.ubuntu.com/4202-1/ https://usn.ubuntu.com/4335-1/ https://www.debian.org/security/2019/dsa-4530 https://www.debian.org/security/2019/dsa-4549 https://www.debian.org/security/2019/dsa-4571 https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-15903 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.tenable.com/security/tns-2021-11
|
| expat | CVE-2022-23990 | LOW | 2.1.0-10.el7_3 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23990 https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23990 https://github.com/libexpat/libexpat/pull/551 https://linux.oracle.com/cve/CVE-2022-23990.html https://linux.oracle.com/errata/ELSA-2022-9232.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34NXVL2RZC2YZRV74ZQ3RNFB7WCEUP7D/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7FF2UH7MPXKTADYSJUAHI2Y5UHBSHUH/ https://nvd.nist.gov/vuln/detail/CVE-2022-23990 https://ubuntu.com/security/notices/USN-5288-1 https://www.debian.org/security/2022/dsa-5073 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-05
|
| file | CVE-2014-9620 | LOW | 5.11-36.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0040.html http://mx.gw.com/pipermail/file/2014/001653.html http://mx.gw.com/pipermail/file/2015/001660.html http://rhn.redhat.com/errata/RHSA-2016-0760.html http://www.debian.org/security/2015/dsa-3121 http://www.openwall.com/lists/oss-security/2015/01/17/9 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/71715 https://access.redhat.com/security/cve/CVE-2014-9620 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620 https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4 https://linux.oracle.com/cve/CVE-2014-9620.html https://linux.oracle.com/errata/ELSA-2016-0760.html https://security.gentoo.org/glsa/201503-08 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
| file | CVE-2015-8865 | LOW | 5.11-36.el7 | | Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
| file-libs | CVE-2014-9620 | LOW | 5.11-36.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0040.html http://mx.gw.com/pipermail/file/2014/001653.html http://mx.gw.com/pipermail/file/2015/001660.html http://rhn.redhat.com/errata/RHSA-2016-0760.html http://www.debian.org/security/2015/dsa-3121 http://www.openwall.com/lists/oss-security/2015/01/17/9 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/71715 https://access.redhat.com/security/cve/CVE-2014-9620 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9620 https://github.com/file/file/commit/ce90e05774dd77d86cfc8dfa6da57b32816841c4 https://linux.oracle.com/cve/CVE-2014-9620.html https://linux.oracle.com/errata/ELSA-2016-0760.html https://security.gentoo.org/glsa/201503-08 https://ubuntu.com/security/notices/USN-3686-1 https://usn.ubuntu.com/3686-1/
|
| file-libs | CVE-2015-8865 | LOW | 5.11-36.el7 | | Expand...http://bugs.gw.com/view.php?id=522 http://git.php.net/?p=php-src.git;a=commit;h=fe13566c93f118a15a96320a546c7878fd0cfc5e http://lists.apple.com/archives/security-announce/2016/May/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00057.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://www.debian.org/security/2016/dsa-3560 http://www.openwall.com/lists/oss-security/2016/04/11/7 http://www.openwall.com/lists/oss-security/2016/04/24/1 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php http://www.securityfocus.com/bid/85802 http://www.ubuntu.com/usn/USN-2952-1 http://www.ubuntu.com/usn/USN-2952-2 https://access.redhat.com/security/cve/CVE-2015-8865 https://bugs.php.net/bug.php?id=71527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8865 https://github.com/file/file/commit/6713ca45e7757297381f4b4cdb9cf5e624a9ad36 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201611-22 https://security.gentoo.org/glsa/201701-42 https://support.apple.com/HT206567 https://ubuntu.com/security/notices/USN-2952-1 https://ubuntu.com/security/notices/USN-2984-1 https://ubuntu.com/security/notices/USN-3686-1 https://ubuntu.com/security/notices/USN-3686-2 https://usn.ubuntu.com/3686-1/ https://usn.ubuntu.com/3686-2/
|
| flex | CVE-2016-6354 | MEDIUM | 2.5.37-6.el7 | | Expand...http://seclists.org/oss-sec/2016/q3/97 http://www.debian.org/security/2016/dsa-3653 http://www.openwall.com/lists/oss-security/2016/07/18/8 http://www.openwall.com/lists/oss-security/2016/07/26/12 https://access.redhat.com/security/cve/CVE-2016-6354 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354 https://github.com/westes/flex/commit/a5cbe929ac3255d371e698f62dc256afe7006466 https://security.gentoo.org/glsa/201701-31
|
| flex | CVE-2019-6293 | LOW | 2.5.37-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-6293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6293 https://github.com/westes/flex/issues/414 https://nvd.nist.gov/vuln/detail/CVE-2019-6293
|
| freetype | CVE-2016-10244 | MEDIUM | 2.8-14.el7_9.1 | | Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/ChangeLog?h=VER-2-7 http://www.debian.org/security/2017/dsa-3839 http://www.securityfocus.com/bid/97405 http://www.securitytracker.com/id/1038090 http://www.securitytracker.com/id/1038201 https://access.redhat.com/security/cve/CVE-2016-10244 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244 https://security.gentoo.org/glsa/201706-14 https://source.android.com/security/bulletin/2017-04-01 https://ubuntu.com/security/notices/USN-3237-1 https://www.oracle.com/security-alerts/cpuapr2020.html
|
| freetype | CVE-2017-8105 | MEDIUM | 2.8-14.el7_9.1 | | Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791 http://www.debian.org/security/2017/dsa-3839 http://www.securityfocus.com/bid/99093 https://access.redhat.com/security/cve/CVE-2017-8105 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 https://security.gentoo.org/glsa/201706-14 https://ubuntu.com/security/notices/USN-3282-1 https://ubuntu.com/security/notices/USN-3282-2 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| freetype | CVE-2017-8287 | MEDIUM | 2.8-14.el7_9.1 | | Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0 http://www.debian.org/security/2017/dsa-3839 http://www.securityfocus.com/bid/99091 https://access.redhat.com/security/cve/CVE-2017-8287 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287 https://security.gentoo.org/glsa/201706-14 https://ubuntu.com/security/notices/USN-3282-1 https://ubuntu.com/security/notices/USN-3282-2 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| freetype | CVE-2022-27404 | MEDIUM | 2.8-14.el7_9.1 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404 https://gitlab.freedesktop.org/freetype/freetype/-/commit/53dfdcd8198d2b3201a23c4bad9190519ba918db https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27404
|
| freetype | CVE-2022-27405 | MEDIUM | 2.8-14.el7_9.1 | | Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405 https://gitlab.freedesktop.org/freetype/freetype/-/commit/22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27405
|
| freetype | CVE-2022-27406 | MEDIUM | 2.8-14.el7_9.1 | | Expand...http://freetype.com https://access.redhat.com/security/cve/CVE-2022-27406 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406 https://gitlab.freedesktop.org/freetype/freetype/-/commit/0c2bdb01a2e1d24a3e592377a6d0822856e10df2 https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFPNRKDLCXHZVYYQLQMP44UHLU32GA6Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDU2FOEMCEF6WVR6ZBIH5MT5O7FAK6UP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IWQ7IB2A75MEHM63WEUXBYEC7OR5SGDY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYVC2NPKKXKP3TWJWG4ONYWNO6ZPHLA5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/ https://nvd.nist.gov/vuln/detail/CVE-2022-27406 https://ubuntu.com/security/notices/USN-5453-1
|
| freetype | CVE-2014-9745 | LOW | 2.8-14.el7_9.1 | | Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=df14e6c0b9592cbb24d5381dfc6106b14f915e75 http://lists.opensuse.org/opensuse-updates/2015-10/msg00017.html http://savannah.nongnu.org/bugs/index.php?41590 http://www.debian.org/security/2015/dsa-3370 http://www.securityfocus.com/bid/76727 http://www.securitytracker.com/id/1033536 http://www.ubuntu.com/usn/USN-2739-1 https://access.redhat.com/security/cve/CVE-2014-9745 https://bugs.launchpad.net/ubuntu/+source/freetype/+bug/1492124 https://code.google.com/p/chromium/issues/detail?id=459050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745 https://ubuntu.com/security/notices/USN-2739-1
|
| freetype | CVE-2014-9746 | LOW | 2.8-14.el7_9.1 | | Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1 http://www.debian.org/security/2015/dsa-3370 http://www.openwall.com/lists/oss-security/2015/09/11/4 http://www.openwall.com/lists/oss-security/2015/09/25/4 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html https://access.redhat.com/security/cve/CVE-2014-9746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746 https://savannah.nongnu.org/bugs/?41309 https://ubuntu.com/security/notices/USN-2739-1
|
| freetype | CVE-2014-9747 | LOW | 2.8-14.el7_9.1 | | Expand...http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1 http://www.debian.org/security/2015/dsa-3370 http://www.openwall.com/lists/oss-security/2015/09/11/4 http://www.openwall.com/lists/oss-security/2015/09/25 http://www.openwall.com/lists/oss-security/2015/09/25/4 https://access.redhat.com/security/cve/CVE-2014-9747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747 https://savannah.nongnu.org/bugs/?41309 https://ubuntu.com/security/notices/USN-2739-1
|
| freetype | CVE-2018-6942 | LOW | 2.8-14.el7_9.1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00054.html https://access.redhat.com/security/cve/CVE-2018-6942 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5736 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942 https://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=29c759284e305ec428703c9a5831d0b1fc3497ef https://ubuntu.com/security/notices/USN-3572-1 https://usn.ubuntu.com/3572-1/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
| gcc | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| gcc | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| gcc | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| gcc | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| gcc | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| gcc | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| gcc | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| gcc | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| gcc | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| gcc | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| gcc | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| gcc | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| gcc | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| gcc | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| gcc | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| gcc | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| gcc | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| gcc-c++ | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| gcc-c++ | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| gcc-c++ | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| gcc-c++ | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| gcc-c++ | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| gcc-c++ | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| gcc-c++ | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| gcc-c++ | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| gcc-c++ | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| gcc-c++ | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| gcc-c++ | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| gcc-c++ | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| gcc-c++ | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| gcc-c++ | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| gcc-c++ | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc-c++ | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc-c++ | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc-c++ | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc-c++ | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc-c++ | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc-c++ | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| gcc-c++ | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| gcc-c++ | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| gcc-c++ | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| git | CVE-2017-14867 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9 http://www.securityfocus.com/bid/101060 http://www.securitytracker.com/id/1039431 https://access.redhat.com/security/cve/CVE-2017-14867 https://bugs.debian.org/876854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867 https://lists.debian.org/debian-security-announce/2017/msg00246.html https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u https://ubuntu.com/security/notices/USN-3438-1 https://www.debian.org/security/2017/dsa-3984
|
| git | CVE-2018-1000021 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
| git | CVE-2019-1348 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/errata/RHSA-2020:0228 https://access.redhat.com/security/cve/CVE-2019-1348 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348 https://github.com/git/git/security/advisories/GHSA-2pw3-gwg9-8pqr https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://linux.oracle.com/cve/CVE-2019-1348.html https://linux.oracle.com/errata/ELSA-2019-4356.html https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://security.gentoo.org/glsa/202003-42 https://support.apple.com/kb/HT210729 https://ubuntu.com/security/notices/USN-4220-1
|
| git | CVE-2019-1349 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/errata/RHSA-2020:0228 https://access.redhat.com/security/cve/CVE-2019-1349 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349 https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7 https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://linux.oracle.com/cve/CVE-2019-1349.html https://linux.oracle.com/errata/ELSA-2019-4356.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349 https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://ubuntu.com/security/notices/USN-4220-1
|
| git | CVE-2021-21300 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html http://seclists.org/fulldisclosure/2021/Apr/60 http://www.openwall.com/lists/oss-security/2021/03/09/3 https://access.redhat.com/security/cve/CVE-2021-21300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300 https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks https://git-scm.com/docs/gitattributes#_filter https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592 https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/ https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/ https://security.gentoo.org/glsa/202104-01 https://support.apple.com/kb/HT212320 https://ubuntu.com/security/notices/USN-4761-1
|
| git | CVE-2021-40330 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...https://access.redhat.com/security/cve/CVE-2021-40330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330 https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473 https://github.com/git/git/compare/v2.30.0...v2.30.1 https://nvd.nist.gov/vuln/detail/CVE-2021-40330 https://ubuntu.com/security/notices/USN-5076-1
|
| git | CVE-2022-24765 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://seclists.org/fulldisclosure/2022/May/31 http://www.openwall.com/lists/oss-security/2022/04/12/7 https://access.redhat.com/security/cve/CVE-2022-24765 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765 https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/ https://support.apple.com/kb/HT213261 https://ubuntu.com/security/notices/USN-5376-1 https://ubuntu.com/security/notices/USN-5376-2 https://ubuntu.com/security/notices/USN-5376-3
|
| git | CVE-2017-15298 | LOW | 1.8.3.1-23.el7_8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/security/cve/CVE-2017-15298 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298 https://github.com/Katee/git-bomb https://kate.io/blog/git-bomb/ https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2 https://ubuntu.com/security/notices/USN-3829-1 https://usn.ubuntu.com/3829-1/
|
| glib2 | CVE-2015-8385 | HIGH | 2.56.1-8.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/85572 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-8385 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385 https://linux.oracle.com/cve/CVE-2015-8385.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
| glib2 | CVE-2016-3191 | HIGH | 2.56.1-8.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://vcs.pcre.org/pcre2?view=revision&revision=489 http://vcs.pcre.org/pcre?view=revision&revision=1631 http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84810 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2016-3191 https://bto.bluecoat.com/security-advisory/sa128 https://bugs.debian.org/815920 https://bugs.debian.org/815921 https://bugs.exim.org/show_bug.cgi?id=1791 https://bugzilla.redhat.com/show_bug.cgi?id=1311503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191 https://linux.oracle.com/cve/CVE-2016-3191.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://ubuntu.com/security/notices/USN-2943-1 https://www.tenable.com/security/tns-2016-18
|
| glib2 | CVE-2021-27219 | HIGH | 2.56.1-8.el7 | 2.56.1-9.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27219.json https://access.redhat.com/security/cve/CVE-2021-27219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219 https://gitlab.gnome.org/GNOME/glib/-/issues/2319 https://linux.oracle.com/cve/CVE-2021-27219.html https://linux.oracle.com/errata/ELSA-2021-9318.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/ https://nvd.nist.gov/vuln/detail/CVE-2021-27219 https://security.gentoo.org/glsa/202107-13 https://security.netapp.com/advisory/ntap-20210319-0004/ https://ubuntu.com/security/notices/USN-4759-1
|
| glib2 | CVE-2015-2327 | MEDIUM | 2.56.1-8.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www.fortiguard.com/advisory/FG-VD-15-010/ http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/74924 https://access.redhat.com/security/cve/CVE-2015-2327 https://bugs.exim.org/show_bug.cgi?id=1503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2327 https://jira.mongodb.org/browse/SERVER-17252 https://ubuntu.com/security/notices/USN-2943-1
|
| glib2 | CVE-2015-2328 | MEDIUM | 2.56.1-8.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.fortiguard.com/advisory/FG-VD-15-014/ http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/74924 https://access.redhat.com/security/cve/CVE-2015-2328 https://bugs.exim.org/show_bug.cgi?id=1515 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328 https://jira.mongodb.org/browse/SERVER-17252 https://linux.oracle.com/cve/CVE-2015-2328.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://ubuntu.com/security/notices/USN-2943-1
|
| glib2 | CVE-2015-3217 | MEDIUM | 2.56.1-8.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre?view=revision&revision=1566 http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/06/03/7 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/75018 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-3217 https://bugs.exim.org/show_bug.cgi?id=1638 https://bugzilla.redhat.com/show_bug.cgi?id=1228283 https://linux.oracle.com/cve/CVE-2015-3217.html https://linux.oracle.com/errata/ELSA-2016-1025.html
|
| glib2 | CVE-2015-5073 | MEDIUM | 2.56.1-8.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?revision=1609&view=markup http://vcs.pcre.org/pcre?view=revision&revision=1571 http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/06/26/1 http://www.openwall.com/lists/oss-security/2015/06/26/3 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/75430 http://www.securitytracker.com/id/1033154 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-5073 https://bugs.exim.org/show_bug.cgi?id=1651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073 https://linux.oracle.com/cve/CVE-2015-5073.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2694-1 https://ubuntu.com/security/notices/USN-2943-1
|
| glib2 | CVE-2015-8388 | MEDIUM | 2.56.1-8.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/85576 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-8388 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388 https://linux.oracle.com/cve/CVE-2015-8388.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
| glib2 | CVE-2015-8391 | MEDIUM | 2.56.1-8.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82990 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-8391 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2015-8391.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
| glib2 | CVE-2021-27218 | MEDIUM | 2.56.1-8.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27218.json https://access.redhat.com/security/cve/CVE-2021-27218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942 https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944 https://linux.oracle.com/cve/CVE-2021-27218.html https://linux.oracle.com/errata/ELSA-2021-3058.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/ https://nvd.nist.gov/vuln/detail/CVE-2021-27218 https://security.gentoo.org/glsa/202107-13 https://security.netapp.com/advisory/ntap-20210319-0004/ https://ubuntu.com/security/notices/USN-4759-1
|
| glib2 | CVE-2021-3800 | MEDIUM | 2.56.1-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3800 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800 https://linux.oracle.com/cve/CVE-2021-3800.html https://linux.oracle.com/errata/ELSA-2021-4385.html https://ubuntu.com/security/notices/USN-5189-1 https://www.openwall.com/lists/oss-security/2017/06/23/8
|
| glib2 | CVE-2015-8386 | LOW | 2.56.1-8.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174931.html http://rhn.redhat.com/errata/RHSA-2016-1025.html http://rhn.redhat.com/errata/RHSA-2016-2750.html http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://www-01.ibm.com/support/docview.wss?uid=isg3T1023886 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/82990 https://access.redhat.com/errata/RHSA-2016:1132 https://access.redhat.com/security/cve/CVE-2015-8386 https://bto.bluecoat.com/security-advisory/sa128 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://linux.oracle.com/cve/CVE-2015-8386.html https://linux.oracle.com/errata/ELSA-2016-1025.html https://security.gentoo.org/glsa/201607-02 https://ubuntu.com/security/notices/USN-2943-1
|
| glib2 | CVE-2017-11164 | LOW | 2.56.1-8.el7 | | Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| glib2 | CVE-2017-7244 | LOW | 2.56.1-8.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7244 https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244 https://security.gentoo.org/glsa/201710-25
|
| glib2 | CVE-2017-7245 | LOW | 2.56.1-8.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7245 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
| glib2 | CVE-2017-7246 | LOW | 2.56.1-8.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7246 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
| glib2 | CVE-2018-16428 | LOW | 2.56.1-8.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/02/14/3 http://www.securityfocus.com/bid/105210 https://access.redhat.com/security/cve/CVE-2018-16428 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428 https://gitlab.gnome.org/GNOME/glib/commit/fccef3cc822af74699cca84cd202719ae61ca3b9 https://gitlab.gnome.org/GNOME/glib/issues/1364 https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html https://ubuntu.com/security/notices/USN-3767-1 https://ubuntu.com/security/notices/USN-3767-2 https://usn.ubuntu.com/3767-1/ https://usn.ubuntu.com/3767-2/
|
| glib2 | CVE-2018-16429 | LOW | 2.56.1-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-16429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429 https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b https://gitlab.gnome.org/GNOME/glib/issues/1361 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html https://ubuntu.com/security/notices/USN-3767-1 https://ubuntu.com/security/notices/USN-3767-2 https://usn.ubuntu.com/3767-1/ https://usn.ubuntu.com/3767-2/
|
| glib2 | CVE-2019-13012 | LOW | 2.56.1-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00022.html https://access.redhat.com/security/cve/CVE-2019-13012 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012 https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429 https://gitlab.gnome.org/GNOME/glib/issues/1658 https://gitlab.gnome.org/GNOME/glib/merge_requests/450 https://linux.oracle.com/cve/CVE-2019-13012.html https://linux.oracle.com/errata/ELSA-2021-1586.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/07/msg00029.html https://lists.debian.org/debian-lts-announce/2019/08/msg00004.html https://nvd.nist.gov/vuln/detail/CVE-2019-13012 https://security.netapp.com/advisory/ntap-20190806-0003/ https://ubuntu.com/security/notices/USN-4049-1 https://ubuntu.com/security/notices/USN-4049-2 https://ubuntu.com/security/notices/USN-4049-3 https://ubuntu.com/security/notices/USN-4049-4 https://usn.ubuntu.com/4049-1/ https://usn.ubuntu.com/4049-2/
|
| glib2 | CVE-2021-28153 | LOW | 2.56.1-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-28153 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153 https://gitlab.gnome.org/GNOME/glib/-/issues/2325 https://linux.oracle.com/cve/CVE-2021-28153.html https://linux.oracle.com/errata/ELSA-2021-4385.html https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RXTD5HCP2K4AAUSWWZTBKQNHRCTAEOF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ICUTQPHZNZWX2DZR46QFLQZRHVMHIILJ/ https://nvd.nist.gov/vuln/detail/CVE-2021-28153 https://security.gentoo.org/glsa/202107-13 https://security.netapp.com/advisory/ntap-20210416-0003/ https://ubuntu.com/security/notices/USN-4764-1
|
| glibc | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | | Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
| glibc | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72740 https://access.redhat.com/security/cve/CVE-2015-8983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983 https://sourceware.org/bugzilla/show_bug.cgi?id=17269 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://seclists.org/fulldisclosure/2021/Sep/0 http://www.openwall.com/lists/oss-security/2016/03/07/16 http://www.securityfocus.com/bid/84204 https://access.redhat.com/security/cve/CVE-2016-1234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19779 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea https://ubuntu.com/security/notices/USN-3239-1
|
| glibc | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 https://access.redhat.com/security/cve/CVE-2016-4429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20112 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3759-1 https://ubuntu.com/security/notices/USN-3759-2 https://usn.ubuntu.com/3759-1/ https://usn.ubuntu.com/3759-2/
|
| glibc | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html http://www.openwall.com/lists/oss-security/2017/05/05/2 http://www.securityfocus.com/bid/98339 https://access.redhat.com/security/cve/CVE-2017-8804 https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7 https://seclists.org/oss-sec/2017/q2/228 https://sourceware.org/bugzilla/show_bug.cgi?id=21461 https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
|
| glibc | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2019-9169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 https://kc.mcafee.com/corporate/index?page=content&id=SB10278 https://linux.oracle.com/cve/CVE-2019-9169.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2019-9169 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=24114 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9 https://support.f5.com/csp/article/K54823184 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/ https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://access.redhat.com/security/cve/CVE-2020-10029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://nvd.nist.gov/vuln/detail/CVE-2020-10029 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-1752 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-1752 https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-29573 https://linux.oracle.com/cve/CVE-2020-29573.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26649 https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
|
| glibc | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
| glibc | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc | CVE-2014-4043 | LOW | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://www.mandriva.com/security/advisories?name=MDVSA-2014:152 http://www.openwall.com/lists/oss-security/2014/06/13/2 http://www.securityfocus.com/bid/68006 https://access.redhat.com/security/cve/CVE-2014-4043 https://bugzilla.redhat.com/show_bug.cgi?id=1109263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043 https://exchange.xforce.ibmcloud.com/vulnerabilities/93784 https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201503-04 https://sourceware.org/bugzilla/show_bug.cgi?id=17048 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362 https://ubuntu.com/security/notices/USN-2306-1
|
| glibc | CVE-2015-8982 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2015/09/08/2 http://www.openwall.com/lists/oss-security/2015/02/13/3 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72602 https://access.redhat.com/security/cve/CVE-2015-8982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceware.org/bugzilla/show_bug.cgi?id=16009 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed https://ubuntu.com/security/notices/USN-3239-1
|
| glibc | CVE-2015-8984 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72789 https://access.redhat.com/security/cve/CVE-2015-8984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984 https://sourceware.org/bugzilla/show_bug.cgi?id=18032 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc | CVE-2015-8985 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
| glibc | CVE-2016-10228 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc | CVE-2017-15671 | LOW | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/101517 https://access.redhat.com/security/cve/CVE-2017-15671 https://sourceware.org/bugzilla/show_bug.cgi?id=22325
|
| glibc | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://nvd.nist.gov/vuln/detail/CVE-2019-19126 https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc | CVE-2020-27618 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc | CVE-2021-33574 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://nvd.nist.gov/vuln/detail/CVE-2021-33574 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
| glibc-common | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | | Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
| glibc-common | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72740 https://access.redhat.com/security/cve/CVE-2015-8983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983 https://sourceware.org/bugzilla/show_bug.cgi?id=17269 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-common | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://seclists.org/fulldisclosure/2021/Sep/0 http://www.openwall.com/lists/oss-security/2016/03/07/16 http://www.securityfocus.com/bid/84204 https://access.redhat.com/security/cve/CVE-2016-1234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19779 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea https://ubuntu.com/security/notices/USN-3239-1
|
| glibc-common | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 https://access.redhat.com/security/cve/CVE-2016-4429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20112 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3759-1 https://ubuntu.com/security/notices/USN-3759-2 https://usn.ubuntu.com/3759-1/ https://usn.ubuntu.com/3759-2/
|
| glibc-common | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html http://www.openwall.com/lists/oss-security/2017/05/05/2 http://www.securityfocus.com/bid/98339 https://access.redhat.com/security/cve/CVE-2017-8804 https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7 https://seclists.org/oss-sec/2017/q2/228 https://sourceware.org/bugzilla/show_bug.cgi?id=21461 https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
|
| glibc-common | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-common | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2019-9169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 https://kc.mcafee.com/corporate/index?page=content&id=SB10278 https://linux.oracle.com/cve/CVE-2019-9169.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2019-9169 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=24114 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9 https://support.f5.com/csp/article/K54823184 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/ https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-common | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://access.redhat.com/security/cve/CVE-2020-10029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://nvd.nist.gov/vuln/detail/CVE-2020-10029 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-common | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-1752 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-1752 https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-common | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-29573 https://linux.oracle.com/cve/CVE-2020-29573.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26649 https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
|
| glibc-common | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
| glibc-common | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc-common | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc-common | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc-common | CVE-2014-4043 | LOW | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://www.mandriva.com/security/advisories?name=MDVSA-2014:152 http://www.openwall.com/lists/oss-security/2014/06/13/2 http://www.securityfocus.com/bid/68006 https://access.redhat.com/security/cve/CVE-2014-4043 https://bugzilla.redhat.com/show_bug.cgi?id=1109263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043 https://exchange.xforce.ibmcloud.com/vulnerabilities/93784 https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201503-04 https://sourceware.org/bugzilla/show_bug.cgi?id=17048 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362 https://ubuntu.com/security/notices/USN-2306-1
|
| glibc-common | CVE-2015-8982 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2015/09/08/2 http://www.openwall.com/lists/oss-security/2015/02/13/3 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72602 https://access.redhat.com/security/cve/CVE-2015-8982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceware.org/bugzilla/show_bug.cgi?id=16009 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed https://ubuntu.com/security/notices/USN-3239-1
|
| glibc-common | CVE-2015-8984 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72789 https://access.redhat.com/security/cve/CVE-2015-8984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984 https://sourceware.org/bugzilla/show_bug.cgi?id=18032 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-common | CVE-2015-8985 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
| glibc-common | CVE-2016-10228 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-common | CVE-2017-15671 | LOW | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/101517 https://access.redhat.com/security/cve/CVE-2017-15671 https://sourceware.org/bugzilla/show_bug.cgi?id=22325
|
| glibc-common | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://nvd.nist.gov/vuln/detail/CVE-2019-19126 https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-common | CVE-2020-27618 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc-common | CVE-2021-33574 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://nvd.nist.gov/vuln/detail/CVE-2021-33574 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
| glibc-devel | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | | Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
| glibc-devel | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72740 https://access.redhat.com/security/cve/CVE-2015-8983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983 https://sourceware.org/bugzilla/show_bug.cgi?id=17269 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-devel | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://seclists.org/fulldisclosure/2021/Sep/0 http://www.openwall.com/lists/oss-security/2016/03/07/16 http://www.securityfocus.com/bid/84204 https://access.redhat.com/security/cve/CVE-2016-1234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19779 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea https://ubuntu.com/security/notices/USN-3239-1
|
| glibc-devel | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 https://access.redhat.com/security/cve/CVE-2016-4429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20112 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3759-1 https://ubuntu.com/security/notices/USN-3759-2 https://usn.ubuntu.com/3759-1/ https://usn.ubuntu.com/3759-2/
|
| glibc-devel | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html http://www.openwall.com/lists/oss-security/2017/05/05/2 http://www.securityfocus.com/bid/98339 https://access.redhat.com/security/cve/CVE-2017-8804 https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7 https://seclists.org/oss-sec/2017/q2/228 https://sourceware.org/bugzilla/show_bug.cgi?id=21461 https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
|
| glibc-devel | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-devel | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2019-9169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 https://kc.mcafee.com/corporate/index?page=content&id=SB10278 https://linux.oracle.com/cve/CVE-2019-9169.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2019-9169 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=24114 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9 https://support.f5.com/csp/article/K54823184 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/ https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-devel | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://access.redhat.com/security/cve/CVE-2020-10029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://nvd.nist.gov/vuln/detail/CVE-2020-10029 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-devel | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-1752 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-1752 https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-devel | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-29573 https://linux.oracle.com/cve/CVE-2020-29573.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26649 https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
|
| glibc-devel | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
| glibc-devel | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc-devel | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc-devel | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc-devel | CVE-2014-4043 | LOW | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://www.mandriva.com/security/advisories?name=MDVSA-2014:152 http://www.openwall.com/lists/oss-security/2014/06/13/2 http://www.securityfocus.com/bid/68006 https://access.redhat.com/security/cve/CVE-2014-4043 https://bugzilla.redhat.com/show_bug.cgi?id=1109263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043 https://exchange.xforce.ibmcloud.com/vulnerabilities/93784 https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201503-04 https://sourceware.org/bugzilla/show_bug.cgi?id=17048 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362 https://ubuntu.com/security/notices/USN-2306-1
|
| glibc-devel | CVE-2015-8982 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2015/09/08/2 http://www.openwall.com/lists/oss-security/2015/02/13/3 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72602 https://access.redhat.com/security/cve/CVE-2015-8982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceware.org/bugzilla/show_bug.cgi?id=16009 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed https://ubuntu.com/security/notices/USN-3239-1
|
| glibc-devel | CVE-2015-8984 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72789 https://access.redhat.com/security/cve/CVE-2015-8984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984 https://sourceware.org/bugzilla/show_bug.cgi?id=18032 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-devel | CVE-2015-8985 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
| glibc-devel | CVE-2016-10228 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-devel | CVE-2017-15671 | LOW | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/101517 https://access.redhat.com/security/cve/CVE-2017-15671 https://sourceware.org/bugzilla/show_bug.cgi?id=22325
|
| glibc-devel | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://nvd.nist.gov/vuln/detail/CVE-2019-19126 https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-devel | CVE-2020-27618 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc-devel | CVE-2021-33574 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://nvd.nist.gov/vuln/detail/CVE-2021-33574 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
| glibc-headers | CVE-2009-5155 | MEDIUM | 2.17-292.el7 | | Expand...http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 https://access.redhat.com/security/cve/CVE-2009-5155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=11053 https://sourceware.org/bugzilla/show_bug.cgi?id=18986 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=eb04c21373e2a2885f3d52ff192b0499afe3c672 https://support.f5.com/csp/article/K64119434 https://support.f5.com/csp/article/K64119434?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4954-1
|
| glibc-headers | CVE-2015-8983 | MEDIUM | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/22/15 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72740 https://access.redhat.com/security/cve/CVE-2015-8983 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983 https://sourceware.org/bugzilla/show_bug.cgi?id=17269 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bdf1ff052a8e23d637f2c838fa5642d78fcedc33 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-headers | CVE-2016-1234 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html http://seclists.org/fulldisclosure/2021/Sep/0 http://www.openwall.com/lists/oss-security/2016/03/07/16 http://www.securityfocus.com/bid/84204 https://access.redhat.com/security/cve/CVE-2016-1234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201702-11 https://sourceware.org/bugzilla/show_bug.cgi?id=19779 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea https://ubuntu.com/security/notices/USN-3239-1
|
| glibc-headers | CVE-2016-4429 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.securityfocus.com/bid/102073 https://access.redhat.com/security/cve/CVE-2016-4429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429 https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html https://source.android.com/security/bulletin/2017-12-01 https://sourceware.org/bugzilla/show_bug.cgi?id=20112 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=bc779a1a5b3035133024b21e2f339fe4219fb11c https://ubuntu.com/security/notices/USN-3239-1 https://ubuntu.com/security/notices/USN-3759-1 https://ubuntu.com/security/notices/USN-3759-2 https://usn.ubuntu.com/3759-1/ https://usn.ubuntu.com/3759-2/
|
| glibc-headers | CVE-2017-8804 | MEDIUM | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00049.html http://www.openwall.com/lists/oss-security/2017/05/05/2 http://www.securityfocus.com/bid/98339 https://access.redhat.com/security/cve/CVE-2017-8804 https://bugzilla.suse.com/show_bug.cgi?id=1037559#c7 https://seclists.org/oss-sec/2017/q2/228 https://sourceware.org/bugzilla/show_bug.cgi?id=21461 https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00128.html https://sourceware.org/legacy-ml/libc-alpha/2017-05/msg00129.html https://sourceware.org/ml/libc-alpha/2017-05/msg00105.html
|
| glibc-headers | CVE-2019-25013 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-25013 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013 https://linux.oracle.com/cve/CVE-2019-25013.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff@%3Cjira.kafka.apache.org%3E https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc@%3Cdev.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c@%3Cissues.zookeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/ https://nvd.nist.gov/vuln/detail/CVE-2019-25013 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210205-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=24973 https://sourceware.org/git/?p=glibc.git;a=commit;h=ee7a3144c9922808181009b7b3e50e852fb4999b https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-headers | CVE-2019-9169 | MEDIUM | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/107160 https://access.redhat.com/security/cve/CVE-2019-9169 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140 https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142 https://kc.mcafee.com/corporate/index?page=content&id=SB10278 https://linux.oracle.com/cve/CVE-2019-9169.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2019-9169 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20190315-0002/ https://sourceware.org/bugzilla/show_bug.cgi?id=24114 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=583dd860d5b833037175247230a328f0050dbfe9 https://support.f5.com/csp/article/K54823184 https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/ https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-headers | CVE-2020-10029 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00033.html https://access.redhat.com/security/cve/CVE-2020-10029 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029 https://linux.oracle.com/cve/CVE-2020-10029.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/23N76M3EDP2GIW4GOIQRYTKRE7PPBRB2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTFUD5VH2GU3YOXA2KBQSBIDZRDWNZ3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VU5JJGENOK7K4X5RYAA5PL647C6HD22E/ https://nvd.nist.gov/vuln/detail/CVE-2020-10029 https://security.gentoo.org/glsa/202006-04 https://security.netapp.com/advisory/ntap-20200327-0003/ https://sourceware.org/bugzilla/show_bug.cgi?id=25487 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=9333498794cde1d5cca518badf79533a24114b6f https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-headers | CVE-2020-1752 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-1752 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752 https://linux.oracle.com/cve/CVE-2020-1752.html https://linux.oracle.com/errata/ELSA-2020-4444.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-1752 https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20200511-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=25414 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=ddc650e9b3dc916eab417ce9f79e67337b05035c https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-headers | CVE-2020-29573 | MEDIUM | 2.17-292.el7 | 2.17-322.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-29573 https://linux.oracle.com/cve/CVE-2020-29573.html https://linux.oracle.com/errata/ELSA-2021-0348.html https://security.gentoo.org/glsa/202101-20 https://security.netapp.com/advisory/ntap-20210122-0004/ https://sourceware.org/bugzilla/show_bug.cgi?id=26649 https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
|
| glibc-headers | CVE-2021-35942 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json https://access.redhat.com/security/cve/CVE-2021-35942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942 https://linux.oracle.com/cve/CVE-2021-35942.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://nvd.nist.gov/vuln/detail/CVE-2021-35942 https://security.netapp.com/advisory/ntap-20210827-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=28011 https://sourceware.org/git/?p=glibc.git;a=commit;h=5adda61f62b77384718b4c0d8336ade8f2b4b35c https://sourceware.org/glibc/wiki/Security%20Exceptions https://ubuntu.com/security/notices/USN-5310-1
|
| glibc-headers | CVE-2021-3999 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json https://access.redhat.com/security/cve/CVE-2021-3999 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999 https://linux.oracle.com/cve/CVE-2021-3999.html https://linux.oracle.com/errata/ELSA-2022-9234.html https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2 https://www.openwall.com/lists/oss-security/2022/01/24/4
|
| glibc-headers | CVE-2022-23218 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218 https://linux.oracle.com/cve/CVE-2022-23218.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23218 https://sourceware.org/bugzilla/show_bug.cgi?id=28768 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc-headers | CVE-2022-23219 | MEDIUM | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-23219 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219 https://linux.oracle.com/cve/CVE-2022-23219.html https://linux.oracle.com/errata/ELSA-2022-9421.html https://nvd.nist.gov/vuln/detail/CVE-2022-23219 https://sourceware.org/bugzilla/show_bug.cgi?id=22542 https://ubuntu.com/security/notices/USN-5310-1 https://ubuntu.com/security/notices/USN-5310-2
|
| glibc-headers | CVE-2014-4043 | LOW | 2.17-292.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html http://seclists.org/fulldisclosure/2019/Jun/18 http://seclists.org/fulldisclosure/2019/Sep/7 http://www.mandriva.com/security/advisories?name=MDVSA-2014:152 http://www.openwall.com/lists/oss-security/2014/06/13/2 http://www.securityfocus.com/bid/68006 https://access.redhat.com/security/cve/CVE-2014-4043 https://bugzilla.redhat.com/show_bug.cgi?id=1109263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043 https://exchange.xforce.ibmcloud.com/vulnerabilities/93784 https://seclists.org/bugtraq/2019/Jun/14 https://seclists.org/bugtraq/2019/Sep/7 https://security.gentoo.org/glsa/201503-04 https://sourceware.org/bugzilla/show_bug.cgi?id=17048 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=ChangeLog;h=3020b9ac232315df362521aeaf85f21cb9926db8;hp=d86e73963dd9fb5e21b1a28326630337226812aa;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=blobdiff;f=posix/spawn_faction_addopen.c;h=40800b8e6e81341501c0fb8a91009529e2048dec;hp=47f62425b696a4fdd511b2a057746322eb6518db;hb=89e435f3559c53084498e9baad22172b64429362;hpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=89e435f3559c53084498e9baad22172b64429362 https://ubuntu.com/security/notices/USN-2306-1
|
| glibc-headers | CVE-2015-8982 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2015/09/08/2 http://www.openwall.com/lists/oss-security/2015/02/13/3 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72602 https://access.redhat.com/security/cve/CVE-2015-8982 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://sourceware.org/bugzilla/show_bug.cgi?id=16009 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commit;h=0f9e585480ed https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0f9e585480ed https://ubuntu.com/security/notices/USN-3239-1
|
| glibc-headers | CVE-2015-8984 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2015/02/26/5 http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/72789 https://access.redhat.com/security/cve/CVE-2015-8984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984 https://sourceware.org/bugzilla/show_bug.cgi?id=18032 https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4a28f4d55a6cc33474c0792fe93b5942d81bf185 https://ubuntu.com/security/notices/USN-3239-1 https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html
|
| glibc-headers | CVE-2015-8985 | LOW | 2.17-292.el7 | | Expand...http://www.openwall.com/lists/oss-security/2017/02/14/9 http://www.securityfocus.com/bid/76916 https://access.redhat.com/security/cve/CVE-2015-8985 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985 https://security.gentoo.org/glsa/201908-06 https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=bc680b336971305cb39896b30d72dc7101b62242
|
| glibc-headers | CVE-2016-10228 | LOW | 2.17-292.el7 | | Expand...http://openwall.com/lists/oss-security/2017/03/01/10 http://www.securityfocus.com/bid/96525 https://access.redhat.com/security/cve/CVE-2016-10228 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228 https://linux.oracle.com/cve/CVE-2016-10228.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://security.gentoo.org/glsa/202101-20 https://sourceware.org/bugzilla/show_bug.cgi?id=19519 https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| glibc-headers | CVE-2017-15671 | LOW | 2.17-292.el7 | | Expand...http://www.securityfocus.com/bid/101517 https://access.redhat.com/security/cve/CVE-2017-15671 https://sourceware.org/bugzilla/show_bug.cgi?id=22325
|
| glibc-headers | CVE-2019-19126 | LOW | 2.17-292.el7 | 2.17-317.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19126 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126 https://linux.oracle.com/cve/CVE-2019-19126.html https://linux.oracle.com/errata/ELSA-2020-3861.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/ https://nvd.nist.gov/vuln/detail/CVE-2019-19126 https://sourceware.org/bugzilla/show_bug.cgi?id=25204 https://sourceware.org/ml/libc-alpha/2019-11/msg00649.html https://ubuntu.com/security/notices/USN-4416-1 https://usn.ubuntu.com/4416-1/
|
| glibc-headers | CVE-2020-27618 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27618 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618 https://linux.oracle.com/cve/CVE-2020-27618.html https://linux.oracle.com/errata/ELSA-2021-9344.html https://nvd.nist.gov/vuln/detail/CVE-2020-27618 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210401-0006/ https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21 https://sourceware.org/bugzilla/show_bug.cgi?id=26224 https://ubuntu.com/security/notices/USN-5310-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| glibc-headers | CVE-2021-33574 | LOW | 2.17-292.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33574 https://linux.oracle.com/cve/CVE-2021-33574.html https://linux.oracle.com/errata/ELSA-2021-9560.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJYYIMDDYOHTP2PORLABTOHYQYYREZDD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBUUWUGXVILQXVWEOU7N42ICHPJNAEUP/ https://nvd.nist.gov/vuln/detail/CVE-2021-33574 https://security.gentoo.org/glsa/202107-07 https://security.netapp.com/advisory/ntap-20210629-0005/ https://sourceware.org/bugzilla/show_bug.cgi?id=27896 https://sourceware.org/bugzilla/show_bug.cgi?id=27896#c1
|
| gmp | CVE-2021-43618 | LOW | 1:6.0.0-15.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-43618 https://bugs.debian.org/994405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618 https://gmplib.org/list-archives/gmp-bugs/2021-September/005077.html https://gmplib.org/repo/gmp-6.2/rev/561a9c25298e https://lists.debian.org/debian-lts-announce/2021/12/msg00001.html https://nvd.nist.gov/vuln/detail/CVE-2021-43618
|
| gnupg2 | CVE-2014-4617 | MEDIUM | 2.0.22-5.el7_5 | | Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=014b2103fcb12f261135e3954f26e9e07b39e342 http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=11fdfcf82bd8d2b5bc38292a29876e10770f4b0a http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000344.html http://lists.gnupg.org/pipermail/gnupg-announce/2014q2/000345.html http://lists.opensuse.org/opensuse-updates/2014-07/msg00010.html http://secunia.com/advisories/59213 http://secunia.com/advisories/59351 http://secunia.com/advisories/59534 http://secunia.com/advisories/59578 http://www.debian.org/security/2014/dsa-2967 http://www.debian.org/security/2014/dsa-2968 http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html http://www.ubuntu.com/usn/USN-2258-1 https://access.redhat.com/security/cve/CVE-2014-4617 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617 https://ubuntu.com/security/notices/USN-2258-1
|
| gnupg2 | CVE-2019-13050 | MEDIUM | 2.0.22-5.el7_5 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00039.html https://access.redhat.com/articles/4264021 https://access.redhat.com/security/cve/CVE-2019-13050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13050 https://errata.almalinux.org/8/ALSA-2020-4490.html https://gist.github.com/rjhansen/67ab921ffb4084c865b3618d6955275f https://linux.oracle.com/cve/CVE-2019-13050.html https://linux.oracle.com/errata/ELSA-2020-4490.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUK2YRO6QIH64WP2LRA5D4LACTXQPPU4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP4ON34YEXEZDZOXXWV43KVGGO6WZLJ5/ https://lists.gnupg.org/pipermail/gnupg-announce/2019q3/000439.html https://support.f5.com/csp/article/K08654551 https://support.f5.com/csp/article/K08654551?utm_source=f5support&utm_medium=RSS https://tech.michaelaltfield.net/2019/07/14/mitigating-poisoned-pgp-certificates/ https://twitter.com/lambdafu/status/1147162583969009664 https://ubuntu.com/security/notices/USN-5431-1
|
| gnupg2 | CVE-2014-3591 | LOW | 2.0.22-5.el7_5 | | Expand...http://www.cs.tau.ac.il/~tromer/radioexp/ http://www.debian.org/security/2015/dsa-3184 http://www.debian.org/security/2015/dsa-3185 https://access.redhat.com/security/cve/CVE-2014-3591 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591 https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html https://ubuntu.com/security/notices/USN-2554-1 https://ubuntu.com/security/notices/USN-2555-1
|
| gnupg2 | CVE-2015-0837 | LOW | 2.0.22-5.el7_5 | | Expand...http://www.debian.org/security/2015/dsa-3184 http://www.debian.org/security/2015/dsa-3185 https://access.redhat.com/security/cve/CVE-2015-0837 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837 https://ieeexplore.ieee.org/document/7163050 https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html https://ubuntu.com/security/notices/USN-2554-1 https://ubuntu.com/security/notices/USN-2555-1
|
| gnupg2 | CVE-2015-1606 | LOW | 2.0.22-5.el7_5 | | Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648 http://www.debian.org/security/2015/dsa-3184 http://www.openwall.com/lists/oss-security/2015/02/13/14 http://www.openwall.com/lists/oss-security/2015/02/14/6 http://www.securitytracker.com/id/1031876 https://access.redhat.com/security/cve/CVE-2015-1606 https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606 https://ubuntu.com/security/notices/USN-2554-1
|
| gnupg2 | CVE-2015-1607 | LOW | 2.0.22-5.el7_5 | | Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2183683bd633818dd031b090b5530951de76f392 http://www.openwall.com/lists/oss-security/2015/02/13/14 http://www.openwall.com/lists/oss-security/2015/02/14/6 http://www.securityfocus.com/bid/72610 http://www.ubuntu.com/usn/usn-2554-1/ https://access.redhat.com/security/cve/CVE-2015-1607 https://blog.fuzzing-project.org/5-Multiple-issues-in-GnuPG-found-through-keyring-fuzzing-TFPA-0012015.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607 https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000361.html https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000362.html https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html https://ubuntu.com/security/notices/USN-2554-1
|
| gnupg2 | CVE-2018-9234 | LOW | 2.0.22-5.el7_5 | | Expand...https://access.redhat.com/security/cve/CVE-2018-9234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234 https://dev.gnupg.org/T3844 https://ubuntu.com/security/notices/USN-3675-1 https://usn.ubuntu.com/3675-1/
|
| gpgme | CVE-2014-3564 | LOW | 1.3.2-5.el7 | | Expand...http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gpgme.git;a=commit;h=2cbd76f7911fc215845e89b50d6af5ff4a83dd77 http://seclists.org/oss-sec/2014/q3/266 http://www.debian.org/security/2014/dsa-3005 http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html http://www.osvdb.org/109699 http://www.securityfocus.com/bid/68990 https://access.redhat.com/security/cve/CVE-2014-3564 https://bugzilla.redhat.com/show_bug.cgi?id=1113267 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564 https://ubuntu.com/security/notices/USN-2307-1
|
| gzip | CVE-2022-1271 | HIGH | 1.5-10.el7 | 1.5-11.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2022-1271 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271 https://errata.almalinux.org/8/ALSA-2022-1537.html https://linux.oracle.com/cve/CVE-2022-1271.html https://linux.oracle.com/errata/ELSA-2022-5052.html https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html https://ubuntu.com/security/notices/USN-5378-1 https://ubuntu.com/security/notices/USN-5378-2 https://ubuntu.com/security/notices/USN-5378-3 https://ubuntu.com/security/notices/USN-5378-4 https://www.openwall.com/lists/oss-security/2022/04/07/8
|
| json-c | CVE-2020-12762 | MEDIUM | 0.11-4.el7_0 | | Expand...https://access.redhat.com/security/cve/CVE-2020-12762 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762 https://github.com/json-c/json-c/pull/592 https://github.com/rsyslog/libfastjson/issues/161 https://linux.oracle.com/cve/CVE-2020-12762.html https://linux.oracle.com/errata/ELSA-2021-4382.html https://lists.debian.org/debian-lts-announce/2020/05/msg00032.html https://lists.debian.org/debian-lts-announce/2020/05/msg00034.html https://lists.debian.org/debian-lts-announce/2020/07/msg00031.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBR36IXYBHITAZFB5PFBJTED22WO5ONB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CQQRRGBQCAWNCCJ2HN3W5SSCZ4QGMXQI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W226TSCJBEOXDUFVKNWNH7ETG7AR6MCS/ https://nvd.nist.gov/vuln/detail/CVE-2020-12762 https://security.gentoo.org/glsa/202006-13 https://security.netapp.com/advisory/ntap-20210521-0001/ https://ubuntu.com/security/notices/USN-4360-1 https://ubuntu.com/security/notices/USN-4360-4 https://usn.ubuntu.com/4360-1/ https://usn.ubuntu.com/4360-4/ https://www.debian.org/security/2020/dsa-4741
|
| kernel-headers | CVE-2016-8666 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fac8e0f579695a3ecbc4d3cac369139d7f819971 http://rhn.redhat.com/errata/RHSA-2016-2047.html http://rhn.redhat.com/errata/RHSA-2016-2107.html http://rhn.redhat.com/errata/RHSA-2016-2110.html http://rhn.redhat.com/errata/RHSA-2017-0004.html http://www.openwall.com/lists/oss-security/2016/10/13/11 http://www.openwall.com/lists/oss-security/2016/10/14/3 http://www.securityfocus.com/bid/93562 https://access.redhat.com/errata/RHSA-2017:0372 https://access.redhat.com/security/cve/CVE-2016-8666 https://bto.bluecoat.com/security-advisory/sa134 https://bugzilla.redhat.com/show_bug.cgi?id=1384991 https://bugzilla.suse.com/show_bug.cgi?id=1001486 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8666 https://github.com/torvalds/linux/commit/fac8e0f579695a3ecbc4d3cac369139d7f819971 https://linux.oracle.com/cve/CVE-2016-8666.html https://linux.oracle.com/errata/ELSA-2017-3508.html
|
| kernel-headers | CVE-2017-1000112 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://seclists.org/oss-sec/2017/q3/277 http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100262 http://www.securitytracker.com/id/1039162 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/errata/RHSA-2017:3200 https://access.redhat.com/errata/RHSA-2019:1931 https://access.redhat.com/errata/RHSA-2019:1932 https://access.redhat.com/errata/RHSA-2019:4159 https://access.redhat.com/security/cve/CVE-2017-1000112 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=85f1bd9a7b5a79d5baa8bf44af19658f7bf77bfa https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112 https://linux.oracle.com/cve/CVE-2017-1000112.html https://linux.oracle.com/errata/ELSA-2017-3631.html https://ubuntu.com/security/notices/USN-3384-1 https://ubuntu.com/security/notices/USN-3384-2 https://ubuntu.com/security/notices/USN-3385-1 https://ubuntu.com/security/notices/USN-3385-2 https://ubuntu.com/security/notices/USN-3386-1 https://ubuntu.com/security/notices/USN-3386-2 https://www.exploit-db.com/exploits/45147/
|
| kernel-headers | CVE-2017-1000251 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://nvidia.custhelp.com/app/answers/detail/a_id/4561 http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100809 http://www.securitytracker.com/id/1039373 https://access.redhat.com/blogs/product-security/posts/blueborne https://access.redhat.com/errata/RHSA-2017:2679 https://access.redhat.com/errata/RHSA-2017:2680 https://access.redhat.com/errata/RHSA-2017:2681 https://access.redhat.com/errata/RHSA-2017:2682 https://access.redhat.com/errata/RHSA-2017:2683 https://access.redhat.com/errata/RHSA-2017:2704 https://access.redhat.com/errata/RHSA-2017:2705 https://access.redhat.com/errata/RHSA-2017:2706 https://access.redhat.com/errata/RHSA-2017:2707 https://access.redhat.com/errata/RHSA-2017:2731 https://access.redhat.com/errata/RHSA-2017:2732 https://access.redhat.com/security/cve/CVE-2017-1000251 https://access.redhat.com/security/vulnerabilities/blueborne https://access.redhat.com/solutions/3177231 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251 https://github.com/torvalds/linux/commit/f2fcfcd670257236ebf2088bbdf26f6a8ef459fe https://linux.oracle.com/cve/CVE-2017-1000251.html https://linux.oracle.com/errata/ELSA-2017-3622.html https://ubuntu.com/security/notices/USN-3419-1 https://ubuntu.com/security/notices/USN-3419-2 https://ubuntu.com/security/notices/USN-3420-1 https://ubuntu.com/security/notices/USN-3420-2 https://ubuntu.com/security/notices/USN-3422-1 https://ubuntu.com/security/notices/USN-3422-2 https://ubuntu.com/security/notices/USN-3423-1 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/BlueBorne https://www.armis.com/blueborne https://www.armis.com/blueborne/ https://www.exploit-db.com/exploits/42762/ https://www.kb.cert.org/vuls/id/240311 https://www.synology.com/support/security/Synology_SA_17_52_BlueBorne
|
| kernel-headers | CVE-2017-15649 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e http://patchwork.ozlabs.org/patch/813945/ http://patchwork.ozlabs.org/patch/818726/ http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.6 http://www.securityfocus.com/bid/101573 https://access.redhat.com/errata/RHSA-2018:0151 https://access.redhat.com/errata/RHSA-2018:0152 https://access.redhat.com/errata/RHSA-2018:0181 https://access.redhat.com/security/cve/CVE-2017-15649 https://blogs.securiteam.com/index.php/archives/3484 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649 https://github.com/torvalds/linux/commit/008ba2a13f2d04c947adc536d19debb8fe66f110 https://github.com/torvalds/linux/commit/4971613c1639d8e5f102c4e797c3bf8f83a5a69e https://linux.oracle.com/cve/CVE-2017-15649.html https://linux.oracle.com/errata/ELSA-2018-0151.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-18595 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.8.2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html https://access.redhat.com/security/cve/CVE-2017-18595 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595 https://git.kernel.org/linus/4397f04575c44e1440ec2e49b6302785c95fd2f8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4397f04575c44e1440ec2e49b6302785c95fd2f8 https://linux.oracle.com/cve/CVE-2017-18595.html https://linux.oracle.com/errata/ELSA-2020-5508.html
|
| kernel-headers | CVE-2017-7533 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e http://openwall.com/lists/oss-security/2017/08/03/2 http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.openwall.com/lists/oss-security/2019/06/27/7 http://www.openwall.com/lists/oss-security/2019/06/28/1 http://www.openwall.com/lists/oss-security/2019/06/28/2 http://www.securityfocus.com/bid/100123 http://www.securitytracker.com/id/1039075 https://access.redhat.com/errata/RHSA-2017:2473 https://access.redhat.com/errata/RHSA-2017:2585 https://access.redhat.com/errata/RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2770 https://access.redhat.com/errata/RHSA-2017:2869 https://access.redhat.com/security/cve/CVE-2017-7533 https://bugzilla.redhat.com/show_bug.cgi?id=1468283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533 https://github.com/torvalds/linux/commit/49d31c2f389acfe83417083e1208422b4091cd9e https://linux.oracle.com/cve/CVE-2017-7533.html https://linux.oracle.com/errata/ELSA-2017-3605.html https://patchwork.kernel.org/patch/9755753/ https://patchwork.kernel.org/patch/9755757/ https://source.android.com/security/bulletin/2017-12-01 https://ubuntu.com/security/notices/USN-3377-1 https://ubuntu.com/security/notices/USN-3377-2 https://ubuntu.com/security/notices/USN-3378-1 https://ubuntu.com/security/notices/USN-3378-2 https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1408967.html
|
| kernel-headers | CVE-2017-8797 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3 http://www.openwall.com/lists/oss-security/2017/06/27/5 http://www.securityfocus.com/bid/99298 http://www.securitytracker.com/id/1038790 https://access.redhat.com/errata/RHSA-2017:1842 https://access.redhat.com/errata/RHSA-2017:2077 https://access.redhat.com/errata/RHSA-2017:2437 https://access.redhat.com/errata/RHSA-2017:2669 https://access.redhat.com/security/cve/CVE-2017-8797 https://bugzilla.redhat.com/show_bug.cgi?id=1466329 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797 https://github.com/torvalds/linux/commit/b550a32e60a4941994b437a8d662432a486235a5 https://github.com/torvalds/linux/commit/f961e3f2acae94b727380c0b74e2d3954d0edf79 https://linux.oracle.com/cve/CVE-2017-8797.html https://linux.oracle.com/errata/ELSA-2017-1842.html
|
| kernel-headers | CVE-2018-20976 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/errata/RHSA-2020:0178 https://access.redhat.com/errata/RHSA-2020:0543 https://access.redhat.com/errata/RHSA-2020:0592 https://access.redhat.com/errata/RHSA-2020:0609 https://access.redhat.com/errata/RHSA-2020:0661 https://access.redhat.com/security/cve/CVE-2018-20976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976 https://git.kernel.org/linus/c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c9fbd7bbc23dbdd73364be4d045e5d3612cf6e82 https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20190905-0002/ https://support.f5.com/csp/article/K10269585?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4144-1 https://ubuntu.com/security/notices/USN-4145-1 https://usn.ubuntu.com/4144-1/ https://usn.ubuntu.com/4145-1/
|
| kernel-headers | CVE-2019-11487 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1062.18.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html http://www.openwall.com/lists/oss-security/2019/04/29/1 http://www.securityfocus.com/bid/108054 https://access.redhat.com/errata/RHSA-2019:2703 https://access.redhat.com/errata/RHSA-2019:2741 https://access.redhat.com/errata/RHSA-2020:0174 https://access.redhat.com/security/cve/CVE-2019-11487 https://bugs.chromium.org/p/project-zero/issues/detail?id=1752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=15fab63e1e57be9fdb5eec1bbc5916e9825e9acb https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6b3a707736301c2128ca85ce85fb13f60b5e350a https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=88b1a17dfc3ed7728316478fae0f5ad508f50397 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8fde12ca79aff9b5ba951fce1a2641901b8d8e64 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f958d7b528b1b40c44cfda5eabe2d82760d868c3 https://github.com/torvalds/linux/commit/15fab63e1e57be9fdb5eec1bbc5916e9825e9acb https://github.com/torvalds/linux/commit/6b3a707736301c2128ca85ce85fb13f60b5e350a https://github.com/torvalds/linux/commit/88b1a17dfc3ed7728316478fae0f5ad508f50397 https://github.com/torvalds/linux/commit/8fde12ca79aff9b5ba951fce1a2641901b8d8e64 https://github.com/torvalds/linux/commit/f958d7b528b1b40c44cfda5eabe2d82760d868c3 https://linux.oracle.com/cve/CVE-2019-11487.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html https://lwn.net/Articles/786044/ https://security.netapp.com/advisory/ntap-20190517-0005/ https://support.f5.com/csp/article/K14255532 https://ubuntu.com/security/notices/USN-4069-1 https://ubuntu.com/security/notices/USN-4069-2 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4145-1 https://usn.ubuntu.com/4069-1/ https://usn.ubuntu.com/4069-2/ https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/ https://usn.ubuntu.com/4145-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-14816 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1062.12.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.openwall.com/lists/oss-security/2019/08/28/1 https://access.redhat.com/errata/RHSA-2020:0174 https://access.redhat.com/errata/RHSA-2020:0204 https://access.redhat.com/errata/RHSA-2020:0328 https://access.redhat.com/errata/RHSA-2020:0339 https://access.redhat.com/errata/RHSA-2020:0374 https://access.redhat.com/errata/RHSA-2020:0375 https://access.redhat.com/errata/RHSA-2020:0653 https://access.redhat.com/errata/RHSA-2020:0661 https://access.redhat.com/errata/RHSA-2020:0664 https://access.redhat.com/security/cve/CVE-2019-14816 https://access.redhat.com/security/cve/cve-2019-14816 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14816 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3 https://linux.oracle.com/cve/CVE-2019-14816.html https://linux.oracle.com/errata/ELSA-2020-5676.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/ https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/ https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20191031-0005/ https://ubuntu.com/security/notices/USN-4157-1 https://ubuntu.com/security/notices/USN-4157-2 https://ubuntu.com/security/notices/USN-4162-1 https://ubuntu.com/security/notices/USN-4162-2 https://ubuntu.com/security/notices/USN-4163-1 https://ubuntu.com/security/notices/USN-4163-2 https://usn.ubuntu.com/4157-1/ https://usn.ubuntu.com/4157-2/ https://usn.ubuntu.com/4162-1/ https://usn.ubuntu.com/4162-2/ https://usn.ubuntu.com/4163-1/ https://usn.ubuntu.com/4163-2/ https://www.openwall.com/lists/oss-security/2019/08/28/1
|
| kernel-headers | CVE-2019-14895 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1062.12.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html https://access.redhat.com/errata/RHSA-2020:0328 https://access.redhat.com/errata/RHSA-2020:0339 https://access.redhat.com/errata/RHSA-2020:0374 https://access.redhat.com/errata/RHSA-2020:0375 https://access.redhat.com/errata/RHSA-2020:0543 https://access.redhat.com/errata/RHSA-2020:0592 https://access.redhat.com/errata/RHSA-2020:0609 https://access.redhat.com/errata/RHSA-2020:0653 https://access.redhat.com/errata/RHSA-2020:0661 https://access.redhat.com/errata/RHSA-2020:0664 https://access.redhat.com/security/cve/CVE-2019-14895 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14895 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895 https://linux.oracle.com/cve/CVE-2019-14895.html https://linux.oracle.com/errata/ELSA-2021-9002.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ https://seclists.org/oss-sec/2019/q4/95 https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4225-2 https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://ubuntu.com/security/notices/USN-4228-1 https://ubuntu.com/security/notices/USN-4228-2 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4225-2/ https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/ https://usn.ubuntu.com/4228-1/ https://usn.ubuntu.com/4228-2/ https://www.openwall.com/lists/oss-security/2019/11/22/2
|
| kernel-headers | CVE-2019-14901 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1062.12.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html https://access.redhat.com/errata/RHSA-2020:0204 https://access.redhat.com/errata/RHSA-2020:0328 https://access.redhat.com/errata/RHSA-2020:0339 https://access.redhat.com/errata/RHSA-2020:0374 https://access.redhat.com/errata/RHSA-2020:0375 https://access.redhat.com/security/cve/CVE-2019-14901 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14901 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14901 https://linux.oracle.com/cve/CVE-2019-14901.html https://linux.oracle.com/errata/ELSA-2020-5569.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/ https://lore.kernel.org/linux-wireless/20191129101054.2756-1-wangqize888888888@gmail.com/ https://patchwork.kernel.org/patch/11257535/ https://seclists.org/oss-sec/2019/q4/96 https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4225-2 https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://ubuntu.com/security/notices/USN-4228-1 https://ubuntu.com/security/notices/USN-4228-2 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4225-2/ https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/ https://usn.ubuntu.com/4228-1/ https://usn.ubuntu.com/4228-2/
|
| kernel-headers | CVE-2019-17133 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1062.12.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/errata/RHSA-2020:0174 https://access.redhat.com/errata/RHSA-2020:0374 https://access.redhat.com/errata/RHSA-2020:0375 https://access.redhat.com/errata/RHSA-2020:0543 https://access.redhat.com/errata/RHSA-2020:0592 https://access.redhat.com/errata/RHSA-2020:0609 https://access.redhat.com/errata/RHSA-2020:0653 https://access.redhat.com/errata/RHSA-2020:0661 https://access.redhat.com/errata/RHSA-2020:0664 https://access.redhat.com/errata/RHSA-2020:0790 https://access.redhat.com/security/cve/CVE-2019-17133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133 https://linux.oracle.com/cve/CVE-2019-17133.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://marc.info/?l=linux-wireless&m=157018270915487&w=2 https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20191031-0005/ https://ubuntu.com/security/notices/USN-4208-1 https://ubuntu.com/security/notices/USN-4210-1 https://ubuntu.com/security/notices/USN-4211-1 https://ubuntu.com/security/notices/USN-4211-2 https://ubuntu.com/security/notices/USN-4226-1 https://usn.ubuntu.com/4208-1/ https://usn.ubuntu.com/4210-1/ https://usn.ubuntu.com/4211-1/ https://usn.ubuntu.com/4211-2/ https://usn.ubuntu.com/4226-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-17666 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1062.18.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html https://access.redhat.com/errata/RHSA-2020:0328 https://access.redhat.com/errata/RHSA-2020:0339 https://access.redhat.com/errata/RHSA-2020:0543 https://access.redhat.com/errata/RHSA-2020:0661 https://access.redhat.com/errata/RHSA-2020:0740 https://access.redhat.com/security/cve/CVE-2019-17666 https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1 https://linux.oracle.com/cve/CVE-2019-17666.html https://linux.oracle.com/errata/ELSA-2020-5535.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRBP4O6D2SQ2NHCRHTJONGCZLWOIV5MN/ https://lkml.org/lkml/2019/10/16/1226 https://lore.kernel.org/lkml/20191016205716.2843-1-labbott@redhat.com/ https://security.netapp.com/advisory/ntap-20191031-0005/ https://twitter.com/nicowaisman/status/1184864519316758535 https://ubuntu.com/security/notices/USN-4183-1 https://ubuntu.com/security/notices/USN-4184-1 https://ubuntu.com/security/notices/USN-4185-1 https://ubuntu.com/security/notices/USN-4186-1 https://ubuntu.com/security/notices/USN-4186-2 https://usn.ubuntu.com/4183-1/ https://usn.ubuntu.com/4184-1/ https://usn.ubuntu.com/4185-1/ https://usn.ubuntu.com/4186-1/ https://usn.ubuntu.com/4186-2/
|
| kernel-headers | CVE-2019-19768 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.8.2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html https://access.redhat.com/security/cve/CVE-2019-19768 https://bugzilla.kernel.org/show_bug.cgi?id=205711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768 https://linux.oracle.com/cve/CVE-2019-19768.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lore.kernel.org/linux-block/20200206142812.25989-1-jack@suse.cz/ https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4342-1 https://ubuntu.com/security/notices/USN-4344-1 https://ubuntu.com/security/notices/USN-4345-1 https://ubuntu.com/security/notices/USN-4346-1 https://usn.ubuntu.com/4342-1/ https://usn.ubuntu.com/4344-1/ https://usn.ubuntu.com/4345-1/ https://usn.ubuntu.com/4346-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2019-19807 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19807 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e7af6307a8a54f0b873960b32b6a644f2d0fbd97 https://git.kernel.org/linus/e7af6307a8a54f0b873960b32b6a644f2d0fbd97 https://github.com/torvalds/linux/commit/e7af6307a8a54f0b873960b32b6a644f2d0fbd97 https://linux.oracle.com/cve/CVE-2019-19807.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/
|
| kernel-headers | CVE-2020-0466 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-0466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466 https://git.kernel.org/linus/52c479697c9b73f628140dcdfcd39ea302d05482 https://git.kernel.org/linus/a9ed4a6560b8562b7e2e2bed9527e88001f7b682 https://linux.oracle.com/cve/CVE-2020-0466.html https://linux.oracle.com/errata/ELSA-2022-0620.html https://source.android.com/security/bulletin/2020-12-01 https://ubuntu.com/security/notices/USN-4912-1
|
| kernel-headers | CVE-2020-10711 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.8.2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html https://access.redhat.com/security/cve/CVE-2020-10711 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711 https://linux.oracle.com/cve/CVE-2020-10711.html https://linux.oracle.com/errata/ELSA-2021-9002.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lore.kernel.org/netdev/07d99ae197bfdb2964931201db67b6cd0b38db5b.1589276729.git.pabeni@redhat.com/T/#u https://nvd.nist.gov/vuln/detail/CVE-2020-10711 https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4411-1 https://ubuntu.com/security/notices/USN-4412-1 https://ubuntu.com/security/notices/USN-4413-1 https://ubuntu.com/security/notices/USN-4414-1 https://ubuntu.com/security/notices/USN-4419-1 https://usn.ubuntu.com/4411-1/ https://usn.ubuntu.com/4412-1/ https://usn.ubuntu.com/4413-1/ https://usn.ubuntu.com/4414-1/ https://usn.ubuntu.com/4419-1/ https://www.debian.org/security/2020/dsa-4698 https://www.debian.org/security/2020/dsa-4699 https://www.openwall.com/lists/oss-security/2020/05/12/2
|
| kernel-headers | CVE-2020-10757 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html https://access.redhat.com/security/cve/CVE-2020-10757 https://bugzilla.redhat.com/show_bug.cgi?id=1842525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10757 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9 https://linux.oracle.com/cve/CVE-2020-10757.html https://linux.oracle.com/errata/ELSA-2020-5756.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/ https://nvd.nist.gov/vuln/detail/CVE-2020-10757 https://security.netapp.com/advisory/ntap-20200702-0004/ https://ubuntu.com/security/notices/USN-4426-1 https://ubuntu.com/security/notices/USN-4439-1 https://ubuntu.com/security/notices/USN-4440-1 https://ubuntu.com/security/notices/USN-4483-1 https://usn.ubuntu.com/4426-1/ https://usn.ubuntu.com/4439-1/ https://usn.ubuntu.com/4440-1/ https://usn.ubuntu.com/4483-1/ https://www.debian.org/security/2020/dsa-4698 https://www.debian.org/security/2020/dsa-4699 https://www.openwall.com/lists/oss-security/2020/06/04/4
|
| kernel-headers | CVE-2020-12362 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-12362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362 https://linux.oracle.com/cve/CVE-2020-12362.html https://linux.oracle.com/errata/ELSA-2021-9434.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
| kernel-headers | CVE-2020-12653 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://www.openwall.com/lists/oss-security/2020/05/08/2 https://access.redhat.com/security/cve/CVE-2020-12653 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12653 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d https://git.kernel.org/linus/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d (5.6-rc1) https://github.com/torvalds/linux/commit/b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d https://linux.oracle.com/cve/CVE-2020-12653.html https://linux.oracle.com/errata/ELSA-2021-9030.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-12653 https://security.netapp.com/advisory/ntap-20200608-0001/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-12654 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://www.openwall.com/lists/oss-security/2020/05/08/2 https://access.redhat.com/security/cve/CVE-2020-12654 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a9b153c5591548612c3955c9600a98150c81875 https://git.kernel.org/linus/3a9b153c5591548612c3955c9600a98150c81875 (5.6-rc1) https://github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875 https://linux.oracle.com/cve/CVE-2020-12654.html https://linux.oracle.com/errata/ELSA-2020-5755.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-12654 https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4392-1 https://ubuntu.com/security/notices/USN-4393-1 https://usn.ubuntu.com/4392-1/ https://usn.ubuntu.com/4393-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-12888 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1127.13.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html http://www.openwall.com/lists/oss-security/2020/05/19/6 https://access.redhat.com/security/cve/CVE-2020-12888 https://bugzilla.redhat.com/show_bug.cgi?id=1836244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888 https://linux.oracle.com/cve/CVE-2020-12888.html https://linux.oracle.com/errata/ELSA-2020-5805.html https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CBEHRQQZTKJTPQFPY3JAO7MQ4JAFEQNW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXGMJHWTMQI34NJZ4BHL3ZVF264AWBF2/ https://lore.kernel.org/kvm/158871401328.15589.17598154478222071285.stgit@gimli.home/ https://lore.kernel.org/kvm/158871570274.15589.10563806532874116326.stgit@gimli.home/ https://nvd.nist.gov/vuln/detail/CVE-2020-12888 https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4525-1 https://ubuntu.com/security/notices/USN-4526-1 https://ubuntu.com/security/notices/USN-5361-1 https://usn.ubuntu.com/4525-1/ https://usn.ubuntu.com/4526-1/
|
| kernel-headers | CVE-2020-8834 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html https://access.redhat.com/security/cve/CVE-2020-8834 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1867717 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8834 https://ubuntu.com/security/notices/USN-4318-1 https://usn.ubuntu.com/4318-1/ https://usn.ubuntu.com/usn/usn-4318-1 https://www.openwall.com/lists/oss-security/2020/04/06/2
|
| kernel-headers | CVE-2021-0920 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2021-0920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920 https://git.kernel.org/linus/cbcf01128d0a92e131bd09f1688fe032480b65ca https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cbcf01128d0a92e131bd09f1688fe032480b65ca https://linux.oracle.com/cve/CVE-2021-0920.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://source.android.com/security/bulletin/2021-11-01 https://ubuntu.com/security/notices/USN-5361-1
|
| kernel-headers | CVE-2021-22543 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 | Expand...http://www.openwall.com/lists/oss-security/2021/06/26/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22543.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22555.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3609.json https://access.redhat.com/security/cve/CVE-2021-22543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543 https://github.com/google/security-research/security/advisories/GHSA-7wq5-phmq-m584 https://github.com/torvalds/linux/commit/f8be156be163a052a067306417cd0ff679068c97 https://linux.oracle.com/cve/CVE-2021-22543.html https://linux.oracle.com/errata/ELSA-2021-9453.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/ https://security.netapp.com/advisory/ntap-20210708-0002/ https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5071-3 https://ubuntu.com/security/notices/USN-5094-1 https://ubuntu.com/security/notices/USN-5094-2 https://ubuntu.com/security/notices/USN-5106-1 https://ubuntu.com/security/notices/USN-5120-1 https://www.openwall.com/lists/oss-security/2021/05/26/3 https://www.openwall.com/lists/oss-security/2021/05/26/4 https://www.openwall.com/lists/oss-security/2021/05/26/5
|
| kernel-headers | CVE-2021-3347 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 | Expand...http://www.openwall.com/lists/oss-security/2021/01/29/4 http://www.openwall.com/lists/oss-security/2021/01/29/5 http://www.openwall.com/lists/oss-security/2021/02/01/4 https://access.redhat.com/security/cve/CVE-2021-3347 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04b79c55201f02ffd675e1231d731365e335c307 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12bb3f7f1b03d5913b3f9d4236a488aa7774dfe9 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2156ac1934166d6deb6cd0f6ffc4c1076ec63697 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=34b1a1ce1458f50ef27c54e28eb9b1947012907a https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6ccc84f917d33312eb2846bd7b567639f585ad6d https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5cade200ab9a2a3be9e7f32a752c8d86b502ec7 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c64396cc36c6e60704ab06c1fb1c4a46179c9120 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2dac39d93987f7de1e20b3988c8685523247ae2 https://linux.oracle.com/cve/CVE-2021-3347.html https://linux.oracle.com/errata/ELSA-2021-9434.html https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CXAVDAK4RLAHBHHGEPL73UFXSI6BXQ7Q/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOBMXDJABYE76RKNBAWA2E4TSSBX7CSJ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3347 https://security.netapp.com/advisory/ntap-20210304-0005/ https://ubuntu.com/security/notices/USN-4878-1 https://ubuntu.com/security/notices/USN-4884-1 https://ubuntu.com/security/notices/USN-4907-1 https://ubuntu.com/security/notices/USN-4910-1 https://www.debian.org/security/2021/dsa-4843 https://www.openwall.com/lists/oss-security/2021/01/29/1 https://www.openwall.com/lists/oss-security/2021/01/29/3
|
| kernel-headers | CVE-2021-37576 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 | Expand...http://www.openwall.com/lists/oss-security/2021/07/27/2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37576.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38201.json https://access.redhat.com/security/cve/CVE-2021-37576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576 https://git.kernel.org/linus/f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a (5.14-rc3) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a https://linux.oracle.com/cve/CVE-2021-37576.html https://linux.oracle.com/errata/ELSA-2021-3801.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/ https://lore.kernel.org/linuxppc-dev/87im0x1lqi.fsf@mpe.ellerman.id.au/T/#u https://nvd.nist.gov/vuln/detail/CVE-2021-37576 https://security.netapp.com/advisory/ntap-20210917-0005/ https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5094-1 https://www.debian.org/security/2021/dsa-4978 https://www.openwall.com/lists/oss-security/2021/07/26/1
|
| kernel-headers | CVE-2021-3864 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3864 https://lore.kernel.org/all/20211221021744.864115-1-longman@redhat.com https://lore.kernel.org/all/20211226150310.GA992@1wt.eu/ https://lore.kernel.org/lkml/20211228170910.623156-1-wander@redhat.com https://www.openwall.com/lists/oss-security/2021/10/20/2
|
| kernel-headers | CVE-2021-4155 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4155.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0185.json https://access.redhat.com/security/cve/CVE-2021-4155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155 https://git.kernel.org/linus/983d8e60f50806f90534cc5373d0ce867e5aaf79 (5.16) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=983d8e60f50806f90534cc5373d0ce867e5aaf79 https://linux.oracle.com/cve/CVE-2021-4155.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5362-1 https://www.openwall.com/lists/oss-security/2022/01/10/1
|
| kernel-headers | CVE-2022-0330 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0330.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0435.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0492.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0847.json https://access.redhat.com/security/cve/CVE-2022-0330 https://bugzilla.redhat.com/show_bug.cgi?id=2042404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330 https://git.kernel.org/linus/7938d61591d33394a21bdd7797a245b65428f44c https://linux.oracle.com/cve/CVE-2022-0330.html https://linux.oracle.com/errata/ELSA-2022-9314.html https://nvd.nist.gov/vuln/detail/CVE-2022-0330 https://security.netapp.com/advisory/ntap-20220526-0001/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5362-1 https://www.openwall.com/lists/oss-security/2022/01/25/12
|
| kernel-headers | CVE-2022-1012 | HIGH | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1012 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012 https://git.kernel.org/linus/b2d057560b8107c633b39aabe517ff9d93f285e3 (5.18-rc6) https://kernel.googlesource.com/pub/scm/linux/kernel/git/jkirsher/net-queue/+/b2d057560b8107c633b39aabe517ff9d93f285e3%5E%21/ https://ubuntu.com/security/notices/USN-5471-1
|
| kernel-headers | CVE-2022-22942 | HIGH | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2022-22942 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942 https://linux.oracle.com/cve/CVE-2022-22942.html https://linux.oracle.com/errata/ELSA-2022-9314.html https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5295-1 https://ubuntu.com/security/notices/USN-5295-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5362-1 https://www.openwall.com/lists/oss-security/2022/01/27/4
|
| kernel-headers | CVE-2012-4542 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://marc.info/?l=linux-kernel&m=135903967015813&w=2 http://marc.info/?l=linux-kernel&m=135904012416042&w=2 http://rhn.redhat.com/errata/RHSA-2013-0496.html http://rhn.redhat.com/errata/RHSA-2013-0579.html http://rhn.redhat.com/errata/RHSA-2013-0882.html http://rhn.redhat.com/errata/RHSA-2013-0928.html https://access.redhat.com/security/cve/CVE-2012-4542 https://bugzilla.redhat.com/show_bug.cgi?id=875360 https://linux.oracle.com/cve/CVE-2012-4542.html https://linux.oracle.com/errata/ELSA-2013-2534.html https://oss.oracle.com/git/?p=redpatch.git;a=commit;h=76a274e17114abf1a77de6b651424648ce9e10c8
|
| kernel-headers | CVE-2013-4270 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2433c8f094a008895e66f25bd1773cdb01c91d01 http://rhn.redhat.com/errata/RHSA-2014-0100.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5 http://www.ubuntu.com/usn/USN-2049-1 https://access.redhat.com/security/cve/CVE-2013-4270 https://bugzilla.redhat.com/show_bug.cgi?id=1027752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4270 https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 https://linux.oracle.com/cve/CVE-2013-4270.html https://linux.oracle.com/errata/ELSA-2014-3002.html https://ubuntu.com/security/notices/USN-2020-1 https://ubuntu.com/security/notices/USN-2023-1 https://ubuntu.com/security/notices/USN-2049-1
|
| kernel-headers | CVE-2013-4350 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=95ee62083cb6453e056562d91f597552021e6ae7 http://rhn.redhat.com/errata/RHSA-2013-1490.html http://www.openwall.com/lists/oss-security/2013/09/13 http://www.openwall.com/lists/oss-security/2013/09/13/3 http://www.ubuntu.com/usn/USN-2019-1 http://www.ubuntu.com/usn/USN-2021-1 http://www.ubuntu.com/usn/USN-2022-1 http://www.ubuntu.com/usn/USN-2024-1 http://www.ubuntu.com/usn/USN-2038-1 http://www.ubuntu.com/usn/USN-2039-1 http://www.ubuntu.com/usn/USN-2041-1 http://www.ubuntu.com/usn/USN-2045-1 http://www.ubuntu.com/usn/USN-2049-1 http://www.ubuntu.com/usn/USN-2050-1 https://access.redhat.com/security/cve/CVE-2013-4350 https://bugzilla.redhat.com/show_bug.cgi?id=1007872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4350 https://github.com/torvalds/linux/commit/95ee62083cb6453e056562d91f597552021e6ae7 https://linux.oracle.com/cve/CVE-2013-4350.html https://linux.oracle.com/errata/ELSA-2014-3002.html https://ubuntu.com/security/notices/USN-2019-1 https://ubuntu.com/security/notices/USN-2021-1 https://ubuntu.com/security/notices/USN-2022-1 https://ubuntu.com/security/notices/USN-2024-1 https://ubuntu.com/security/notices/USN-2038-1 https://ubuntu.com/security/notices/USN-2039-1 https://ubuntu.com/security/notices/USN-2041-1 https://ubuntu.com/security/notices/USN-2045-1 https://ubuntu.com/security/notices/USN-2049-1 https://ubuntu.com/security/notices/USN-2050-1
|
| kernel-headers | CVE-2013-7446 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7d267278a9ece963d77eefec61630223fce08c6c http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00034.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00041.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00042.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2015/dsa-3426 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.3 http://www.openwall.com/lists/oss-security/2015/11/18/16 http://www.openwall.com/lists/oss-security/2015/11/18/9 http://www.securityfocus.com/bid/77638 http://www.securitytracker.com/id/1034557 http://www.spinics.net/lists/netdev/msg318826.html http://www.ubuntu.com/usn/USN-2886-1 http://www.ubuntu.com/usn/USN-2887-1 http://www.ubuntu.com/usn/USN-2887-2 http://www.ubuntu.com/usn/USN-2888-1 http://www.ubuntu.com/usn/USN-2889-1 http://www.ubuntu.com/usn/USN-2889-2 http://www.ubuntu.com/usn/USN-2890-1 http://www.ubuntu.com/usn/USN-2890-2 http://www.ubuntu.com/usn/USN-2890-3 https://access.redhat.com/security/cve/CVE-2013-7446 https://bugzilla.redhat.com/show_bug.cgi?id=1273845 https://bugzilla.redhat.com/show_bug.cgi?id=1282688 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446 https://forums.grsecurity.net/viewtopic.php?f=3&t=4150 https://github.com/torvalds/linux/commit/7d267278a9ece963d77eefec61630223fce08c6c https://groups.google.com/forum/#!topic/syzkaller/3twDUI4Cpm8 https://linux.oracle.com/cve/CVE-2013-7446.html https://linux.oracle.com/errata/ELSA-2017-3516.html https://lkml.org/lkml/2013/10/14/424 https://lkml.org/lkml/2014/5/15/532 https://lkml.org/lkml/2015/9/13/195 https://ubuntu.com/security/notices/USN-2886-1 https://ubuntu.com/security/notices/USN-2886-2 https://ubuntu.com/security/notices/USN-2887-1 https://ubuntu.com/security/notices/USN-2887-2 https://ubuntu.com/security/notices/USN-2888-1 https://ubuntu.com/security/notices/USN-2889-1 https://ubuntu.com/security/notices/USN-2889-2 https://ubuntu.com/security/notices/USN-2890-1 https://ubuntu.com/security/notices/USN-2890-2 https://ubuntu.com/security/notices/USN-2890-3
|
| kernel-headers | CVE-2014-2039 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8d7f6690cedb83456edd41c9bd583783f0703bf0 http://linux.oracle.com/errata/ELSA-2014-0771.html http://secunia.com/advisories/59262 http://secunia.com/advisories/59309 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.5 http://www.openwall.com/lists/oss-security/2014/02/20/14 http://www.securityfocus.com/bid/65700 https://access.redhat.com/security/cve/CVE-2014-2039 https://bugzilla.redhat.com/show_bug.cgi?id=1067558 https://github.com/torvalds/linux/commit/8d7f6690cedb83456edd41c9bd583783f0703bf0 https://linux.oracle.com/cve/CVE-2014-2039.html https://linux.oracle.com/errata/ELSA-2014-0771.html
|
| kernel-headers | CVE-2014-9710 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.html http://www.openwall.com/lists/oss-security/2015/03/24/11 http://www.securitytracker.com/id/1032418 https://access.redhat.com/security/cve/CVE-2014-9710 https://bugzilla.redhat.com/show_bug.cgi?id=1205079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9710 https://github.com/torvalds/linux/commit/5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339 https://linux.oracle.com/cve/CVE-2014-9710.html https://linux.oracle.com/errata/ELSA-2017-3597.html https://ubuntu.com/security/notices/USN-2615-1 https://ubuntu.com/security/notices/USN-2616-1 https://ubuntu.com/security/notices/USN-2662-1 https://ubuntu.com/security/notices/USN-2663-1
|
| kernel-headers | CVE-2014-9728 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2 http://www.openwall.com/lists/oss-security/2015/06/02/7 http://www.securityfocus.com/bid/74964 https://access.redhat.com/security/cve/CVE-2014-9728 https://bugzilla.redhat.com/show_bug.cgi?id=1228229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1d47b262952a45aae62bd49cfaf33dd76c11a2c (v3.19-rc3) https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3) https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3) https://github.com/torvalds/linux/commit/a1d47b262952a45aae62bd49cfaf33dd76c11a2c https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9 https://linux.oracle.com/cve/CVE-2014-9728.html https://linux.oracle.com/errata/ELSA-2019-4316.html https://ubuntu.com/security/notices/USN-2517-1 https://ubuntu.com/security/notices/USN-2518-1 https://ubuntu.com/security/notices/USN-2541-1 https://ubuntu.com/security/notices/USN-2542-1 https://ubuntu.com/security/notices/USN-2543-1 https://ubuntu.com/security/notices/USN-2544-1
|
| kernel-headers | CVE-2014-9729 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2 http://www.openwall.com/lists/oss-security/2015/06/02/7 http://www.securityfocus.com/bid/74964 https://access.redhat.com/security/cve/CVE-2014-9729 https://bugzilla.redhat.com/show_bug.cgi?id=1228229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 (v3.19-rc3) https://github.com/torvalds/linux/commit/e159332b9af4b04d882dbcfe1bb0117f0a6d4b58 https://ubuntu.com/security/notices/USN-2517-1 https://ubuntu.com/security/notices/USN-2518-1 https://ubuntu.com/security/notices/USN-2541-1 https://ubuntu.com/security/notices/USN-2542-1 https://ubuntu.com/security/notices/USN-2543-1 https://ubuntu.com/security/notices/USN-2544-1
|
| kernel-headers | CVE-2014-9730 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2 http://www.openwall.com/lists/oss-security/2015/06/02/7 http://www.securityfocus.com/bid/74964 https://access.redhat.com/security/cve/CVE-2014-9730 https://bugzilla.redhat.com/show_bug.cgi?id=1228229 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e237ec37ec154564f8690c5bd1795339955eeef9 (v3.19-rc3) https://github.com/torvalds/linux/commit/e237ec37ec154564f8690c5bd1795339955eeef9 https://ubuntu.com/security/notices/USN-2517-1 https://ubuntu.com/security/notices/USN-2518-1 https://ubuntu.com/security/notices/USN-2541-1 https://ubuntu.com/security/notices/USN-2542-1 https://ubuntu.com/security/notices/USN-2543-1 https://ubuntu.com/security/notices/USN-2544-1
|
| kernel-headers | CVE-2015-4167 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23b133bdc452aa441fcb9b82cbf6dd05cfd342d0 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://www.debian.org/security/2015/dsa-3290 http://www.debian.org/security/2015/dsa-3313 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.1 http://www.openwall.com/lists/oss-security/2015/06/02/6 http://www.securityfocus.com/bid/74963 http://www.securitytracker.com/id/1033187 http://www.ubuntu.com/usn/USN-2631-1 http://www.ubuntu.com/usn/USN-2632-1 https://access.redhat.com/security/cve/CVE-2015-4167 https://bugzilla.redhat.com/show_bug.cgi?id=1228204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167 https://github.com/torvalds/linux/commit/23b133bdc452aa441fcb9b82cbf6dd05cfd342d0 https://linux.oracle.com/cve/CVE-2015-4167.html https://linux.oracle.com/errata/ELSA-2017-3597.html https://ubuntu.com/security/notices/USN-2631-1 https://ubuntu.com/security/notices/USN-2632-1 https://ubuntu.com/security/notices/USN-2662-1 https://ubuntu.com/security/notices/USN-2663-1 https://ubuntu.com/security/notices/USN-2664-1 https://ubuntu.com/security/notices/USN-2666-1
|
| kernel-headers | CVE-2015-4177 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae http://openwall.com/lists/oss-security/2015/05/29/10 http://openwall.com/lists/oss-security/2015/05/29/5 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5 http://www.openwall.com/lists/oss-security/2015/06/04/5 https://access.redhat.com/security/cve/CVE-2015-4177 https://bugzilla.redhat.com/show_bug.cgi?id=1248486 https://github.com/torvalds/linux/commit/cd4a40174b71acd021877341684d8bb1dc8ea4ae
|
| kernel-headers | CVE-2015-4692 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009 http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160829.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/161144.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://www.debian.org/security/2015/dsa-3329 http://www.openwall.com/lists/oss-security/2015/06/10/6 http://www.openwall.com/lists/oss-security/2015/06/21/1 http://www.securityfocus.com/bid/75142 http://www.securitytracker.com/id/1032798 http://www.ubuntu.com/usn/USN-2680-1 http://www.ubuntu.com/usn/USN-2681-1 http://www.ubuntu.com/usn/USN-2682-1 http://www.ubuntu.com/usn/USN-2683-1 http://www.ubuntu.com/usn/USN-2684-1 https://access.redhat.com/security/cve/CVE-2015-4692 https://bugzilla.redhat.com/show_bug.cgi?id=1230770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4692 https://github.com/torvalds/linux/commit/ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009 https://lkml.org/lkml/2015/6/4/163 https://ubuntu.com/security/notices/USN-2680-1 https://ubuntu.com/security/notices/USN-2681-1 https://ubuntu.com/security/notices/USN-2682-1 https://ubuntu.com/security/notices/USN-2683-1 https://ubuntu.com/security/notices/USN-2684-1
|
| kernel-headers | CVE-2015-5707 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=451a2886b6bf90e2fb378f7c46c655450fb96e81 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdc81f45e9f57858da6351836507fbcf1b7583ee http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00030.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00032.html http://www.debian.org/security/2015/dsa-3329 http://www.openwall.com/lists/oss-security/2015/08/01/6 http://www.securityfocus.com/bid/76145 http://www.securitytracker.com/id/1033521 http://www.ubuntu.com/usn/USN-2733-1 http://www.ubuntu.com/usn/USN-2734-1 http://www.ubuntu.com/usn/USN-2737-1 http://www.ubuntu.com/usn/USN-2738-1 http://www.ubuntu.com/usn/USN-2750-1 http://www.ubuntu.com/usn/USN-2759-1 http://www.ubuntu.com/usn/USN-2760-1 https://access.redhat.com/security/cve/CVE-2015-5707 https://bugzilla.redhat.com/show_bug.cgi?id=1250030 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707 https://github.com/torvalds/linux/commit/451a2886b6bf90e2fb378f7c46c655450fb96e81 https://github.com/torvalds/linux/commit/fdc81f45e9f57858da6351836507fbcf1b7583ee https://linux.oracle.com/cve/CVE-2015-5707.html https://linux.oracle.com/errata/ELSA-2017-3535.html https://source.android.com/security/bulletin/2017-07-01 https://ubuntu.com/security/notices/USN-2733-1 https://ubuntu.com/security/notices/USN-2734-1 https://ubuntu.com/security/notices/USN-2737-1 https://ubuntu.com/security/notices/USN-2738-1 https://ubuntu.com/security/notices/USN-2750-1 https://ubuntu.com/security/notices/USN-2759-1 https://ubuntu.com/security/notices/USN-2760-1
|
| kernel-headers | CVE-2015-7513 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0185604c2d82c560dab2f2933a18f797e74ab5a8 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html http://www.debian.org/security/2016/dsa-3434 http://www.openwall.com/lists/oss-security/2016/01/07/2 http://www.securityfocus.com/bid/79901 http://www.securitytracker.com/id/1034602 http://www.ubuntu.com/usn/USN-2886-1 http://www.ubuntu.com/usn/USN-2887-1 http://www.ubuntu.com/usn/USN-2887-2 http://www.ubuntu.com/usn/USN-2888-1 http://www.ubuntu.com/usn/USN-2889-1 http://www.ubuntu.com/usn/USN-2889-2 http://www.ubuntu.com/usn/USN-2890-1 http://www.ubuntu.com/usn/USN-2890-2 http://www.ubuntu.com/usn/USN-2890-3 https://access.redhat.com/security/cve/CVE-2015-7513 https://bugzilla.redhat.com/show_bug.cgi?id=1284847 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513 https://git.kernel.org/linus/0185604c2d82c560dab2f2933a18f797e74ab5a8 (v4.4-rc7) https://github.com/torvalds/linux/commit/0185604c2d82c560dab2f2933a18f797e74ab5a8 https://ubuntu.com/security/notices/USN-2886-1 https://ubuntu.com/security/notices/USN-2886-2 https://ubuntu.com/security/notices/USN-2887-1 https://ubuntu.com/security/notices/USN-2887-2 https://ubuntu.com/security/notices/USN-2888-1 https://ubuntu.com/security/notices/USN-2889-1 https://ubuntu.com/security/notices/USN-2889-2 https://ubuntu.com/security/notices/USN-2890-1 https://ubuntu.com/security/notices/USN-2890-2 https://ubuntu.com/security/notices/USN-2890-3
|
| kernel-headers | CVE-2015-7550 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b4a1b4f5047e4f54e194681125c74c0aa64d637d http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3434 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4 http://www.securityfocus.com/bid/79903 http://www.ubuntu.com/usn/USN-2888-1 http://www.ubuntu.com/usn/USN-2890-1 http://www.ubuntu.com/usn/USN-2890-2 http://www.ubuntu.com/usn/USN-2890-3 http://www.ubuntu.com/usn/USN-2911-1 http://www.ubuntu.com/usn/USN-2911-2 https://access.redhat.com/security/cve/CVE-2015-7550 https://bugzilla.redhat.com/show_bug.cgi?id=1291197 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550 https://git.kernel.org/linus/b4a1b4f5047e4f54e194681125c74c0aa64d637d https://github.com/torvalds/linux/commit/b4a1b4f5047e4f54e194681125c74c0aa64d637d https://security-tracker.debian.org/tracker/CVE-2015-7550 https://ubuntu.com/security/notices/USN-2888-1 https://ubuntu.com/security/notices/USN-2890-1 https://ubuntu.com/security/notices/USN-2890-2 https://ubuntu.com/security/notices/USN-2890-3 https://ubuntu.com/security/notices/USN-2907-1 https://ubuntu.com/security/notices/USN-2907-2 https://ubuntu.com/security/notices/USN-2910-1 https://ubuntu.com/security/notices/USN-2911-1 https://ubuntu.com/security/notices/USN-2911-2
|
| kernel-headers | CVE-2015-8953 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab79efab0a0ba01a74df782eb7fa44b044dae8b5 http://seclists.org/oss-sec/2016/q3/371 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.6 http://www.openwall.com/lists/oss-security/2016/08/23/9 http://www.securityfocus.com/bid/92611 https://access.redhat.com/security/cve/CVE-2015-8953 https://bugzilla.redhat.com/show_bug.cgi?id=1367814 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8953 https://github.com/torvalds/linux/commit/ab79efab0a0ba01a74df782eb7fa44b044dae8b5
|
| kernel-headers | CVE-2015-9289 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...https://access.redhat.com/security/cve/CVE-2015-9289 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1fa2337a315a2448c5434f41e00d56b01a22283c https://github.com/torvalds/linux/commit/1fa2337a315a2448c5434f41e00d56b01a22283c https://linux.oracle.com/cve/CVE-2015-9289.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.4
|
| kernel-headers | CVE-2016-0723 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://lkml.iu.edu/hypermail/linux/kernel/1511.3/03045.html http://source.android.com/security/bulletin/2016-07-01.html http://www.debian.org/security/2016/dsa-3448 http://www.debian.org/security/2016/dsa-3503 http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/82950 http://www.securitytracker.com/id/1035695 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2948-1 http://www.ubuntu.com/usn/USN-2948-2 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2016-0723 https://bugzilla.redhat.com/show_bug.cgi?id=1296253 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723 https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439 https://linux.oracle.com/cve/CVE-2016-0723.html https://linux.oracle.com/errata/ELSA-2016-3596.html https://security-tracker.debian.org/tracker/CVE-2016-0723 https://support.f5.com/csp/article/K43650115 https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2948-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2
|
| kernel-headers | CVE-2016-0821 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8a5e5e02fc83aaf67053ab53b359af08c6c49aaf http://source.android.com/security/bulletin/2016-03-01.html http://www.debian.org/security/2016/dsa-3607 http://www.openwall.com/lists/oss-security/2015/05/02/6 http://www.securityfocus.com/bid/84260 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 https://access.redhat.com/security/cve/CVE-2016-0821 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0821 https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3
|
| kernel-headers | CVE-2016-10044 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=22f6b4d34fcf039c63a94e7670e0da24f8575a5a http://source.android.com/security/bulletin/2017-02-01.html http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.7 http://www.securityfocus.com/bid/96122 http://www.securitytracker.com/id/1037798 https://access.redhat.com/security/cve/CVE-2016-10044 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10044 https://github.com/torvalds/linux/commit/22f6b4d34fcf039c63a94e7670e0da24f8575a5a https://linux.oracle.com/cve/CVE-2016-10044.html https://linux.oracle.com/errata/ELSA-2017-3637.html https://ubuntu.com/security/notices/USN-3422-1 https://ubuntu.com/security/notices/USN-3422-2
|
| kernel-headers | CVE-2016-2085 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=613317bd212c585c20796c10afe5daaa95d4b0a1 http://www.ubuntu.com/usn/USN-2946-1 http://www.ubuntu.com/usn/USN-2946-2 http://www.ubuntu.com/usn/USN-2947-1 http://www.ubuntu.com/usn/USN-2947-2 http://www.ubuntu.com/usn/USN-2947-3 http://www.ubuntu.com/usn/USN-2948-1 http://www.ubuntu.com/usn/USN-2948-2 http://www.ubuntu.com/usn/USN-2949-1 https://access.redhat.com/security/cve/CVE-2016-2085 https://bugzilla.redhat.com/show_bug.cgi?id=1324867 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2085 https://github.com/torvalds/linux/commit/613317bd212c585c20796c10afe5daaa95d4b0a1 https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2085.html https://security-tracker.debian.org/tracker/CVE-2016-2085 https://ubuntu.com/security/notices/USN-2946-1 https://ubuntu.com/security/notices/USN-2946-2 https://ubuntu.com/security/notices/USN-2947-1 https://ubuntu.com/security/notices/USN-2947-2 https://ubuntu.com/security/notices/USN-2947-3 https://ubuntu.com/security/notices/USN-2948-1 https://ubuntu.com/security/notices/USN-2949-1
|
| kernel-headers | CVE-2016-2546 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=af368027a49a751d6ff4ee9e3f9961f35bb4fede http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3503 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1 http://www.openwall.com/lists/oss-security/2016/01/19/1 http://www.openwall.com/lists/oss-security/2016/02/23/11 http://www.securityfocus.com/bid/83384 http://www.securitytracker.com/id/1035301 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2931-1 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2016-2546 https://bugzilla.redhat.com/show_bug.cgi?id=1311564 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546 https://github.com/torvalds/linux/commit/af368027a49a751d6ff4ee9e3f9961f35bb4fede https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2931-1 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2
|
| kernel-headers | CVE-2016-3157 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.debian.org/security/2016/dsa-3607 http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html http://www.securityfocus.com/bid/84594 http://www.securitytracker.com/id/1035308 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 http://xenbits.xen.org/xsa/advisory-171.html http://xenbits.xen.org/xsa/xsa171.patch https://access.redhat.com/security/cve/CVE-2016-3157 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3157 https://linux.oracle.com/cve/CVE-2016-3157.html https://linux.oracle.com/errata/ELSA-2016-3657.html https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1
|
| kernel-headers | CVE-2016-4794 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-2574.html http://rhn.redhat.com/errata/RHSA-2016-2584.html http://www.openwall.com/lists/oss-security/2016/05/12/6 http://www.securityfocus.com/bid/90625 http://www.ubuntu.com/usn/USN-3053-1 http://www.ubuntu.com/usn/USN-3054-1 http://www.ubuntu.com/usn/USN-3055-1 http://www.ubuntu.com/usn/USN-3056-1 http://www.ubuntu.com/usn/USN-3057-1 https://access.redhat.com/security/cve/CVE-2016-4794 https://bugzilla.redhat.com/show_bug.cgi?id=1335889 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794 https://linux.oracle.com/cve/CVE-2016-4794.html https://linux.oracle.com/errata/ELSA-2016-3644.html https://lkml.org/lkml/2016/4/17/125 https://source.android.com/security/bulletin/2016-12-01.html https://ubuntu.com/security/notices/USN-3053-1 https://ubuntu.com/security/notices/USN-3054-1 https://ubuntu.com/security/notices/USN-3055-1 https://ubuntu.com/security/notices/USN-3056-1 https://ubuntu.com/security/notices/USN-3057-1
|
| kernel-headers | CVE-2016-7911 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8ba8682107ee2ca3347354e018865d8e1967c5f4 http://source.android.com/security/bulletin/2016-11-01.html http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.6 http://www.securityfocus.com/bid/94135 https://access.redhat.com/security/cve/CVE-2016-7911 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911 https://github.com/torvalds/linux/commit/8ba8682107ee2ca3347354e018865d8e1967c5f4 https://ubuntu.com/security/notices/USN-3206-1 https://ubuntu.com/security/notices/USN-3207-1 https://ubuntu.com/security/notices/USN-3207-2
|
| kernel-headers | CVE-2017-1000111 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100267 http://www.securitytracker.com/id/1039132 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/errata/RHSA-2017:3200 https://access.redhat.com/security/cve/CVE-2017-1000111 https://access.redhat.com/security/cve/cve-2017-1000111 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=c27927e372f0785f3303e8fad94b85945e2c97b7 https://linux.oracle.com/cve/CVE-2017-1000111.html https://linux.oracle.com/errata/ELSA-2017-3633.html https://ubuntu.com/security/notices/USN-3384-1 https://ubuntu.com/security/notices/USN-3384-2 https://ubuntu.com/security/notices/USN-3385-1 https://ubuntu.com/security/notices/USN-3385-2 https://ubuntu.com/security/notices/USN-3386-1 https://ubuntu.com/security/notices/USN-3386-2
|
| kernel-headers | CVE-2017-1000380 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378 http://www.debian.org/security/2017/dsa-3981 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.5 http://www.openwall.com/lists/oss-security/2017/06/12/2 http://www.securityfocus.com/bid/99121 https://access.redhat.com/errata/RHSA-2017:3295 https://access.redhat.com/errata/RHSA-2017:3315 https://access.redhat.com/errata/RHSA-2017:3322 https://access.redhat.com/security/cve/CVE-2017-1000380 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380 https://github.com/torvalds/linux/commit/ba3021b2c79b2fa9114f92790a99deb27a65b728 https://github.com/torvalds/linux/commit/d11662f4f798b50d8c8743f433842c3e40fe3378 https://linux.oracle.com/cve/CVE-2017-1000380.html https://linux.oracle.com/errata/ELSA-2017-3637.html https://source.android.com/security/bulletin/pixel/2017-12-01 https://ubuntu.com/security/notices/USN-3358-1 https://ubuntu.com/security/notices/USN-3359-1 https://ubuntu.com/security/notices/USN-3360-1 https://ubuntu.com/security/notices/USN-3360-2 https://ubuntu.com/security/notices/USN-3364-1 https://ubuntu.com/security/notices/USN-3364-2 https://ubuntu.com/security/notices/USN-3364-3 https://ubuntu.com/security/notices/USN-3371-1
|
| kernel-headers | CVE-2017-11176 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1 http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.securityfocus.com/bid/99919 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/errata/RHSA-2018:0169 https://access.redhat.com/errata/RHSA-2018:3822 https://access.redhat.com/security/cve/CVE-2017-11176 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f991af3daabaecff34684fd51fac80319d1baad1 https://github.com/torvalds/linux/commit/f991af3daabaecff34684fd51fac80319d1baad1 https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://linux.oracle.com/cve/CVE-2017-11176.html https://linux.oracle.com/errata/ELSA-2018-0169.html https://ubuntu.com/security/notices/USN-3405-1 https://ubuntu.com/security/notices/USN-3405-2 https://ubuntu.com/security/notices/USN-3468-1 https://ubuntu.com/security/notices/USN-3468-2 https://ubuntu.com/security/notices/USN-3468-3 https://ubuntu.com/security/notices/USN-3470-1 https://ubuntu.com/security/notices/USN-3470-2 https://www.exploit-db.com/exploits/45553/
|
| kernel-headers | CVE-2017-11600 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html http://seclists.org/bugtraq/2017/Jul/30 http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/99928 https://access.redhat.com/errata/RHSA-2018:1965 https://access.redhat.com/errata/RHSA-2018:2003 https://access.redhat.com/errata/RHSA-2019:1170 https://access.redhat.com/errata/RHSA-2019:1190 https://access.redhat.com/security/cve/CVE-2017-11600 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/xfrm/xfrm_policy.c?id=7bab09631c2a303f87a7eb7e3d69e888673b9b7e https://linux.oracle.com/cve/CVE-2017-11600.html https://linux.oracle.com/errata/ELSA-2018-4172.html https://source.android.com/security/bulletin/pixel/2017-11-01
|
| kernel-headers | CVE-2017-13693 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/100502 https://access.redhat.com/security/cve/CVE-2017-13693 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13693 https://github.com/acpica/acpica/pull/295/commits/987a3b5cf7175916e2a4b6ea5b8e70f830dfe732 https://patchwork.kernel.org/patch/9919053/
|
| kernel-headers | CVE-2017-13694 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/100500 https://access.redhat.com/security/cve/CVE-2017-13694 https://github.com/acpica/acpica/pull/278/commits/4a0243ecb4c94e2d73510d096c5ea4d0711fc6c0 https://patchwork.kernel.org/patch/9806085/
|
| kernel-headers | CVE-2017-13695 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/100497 https://access.redhat.com/security/cve/CVE-2017-13695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13695 https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5 https://linux.oracle.com/cve/CVE-2017-13695.html https://linux.oracle.com/errata/ELSA-2018-4250.html https://patchwork.kernel.org/patch/9850567/ https://ubuntu.com/security/notices/USN-3696-1 https://ubuntu.com/security/notices/USN-3696-2 https://ubuntu.com/security/notices/USN-3762-1 https://ubuntu.com/security/notices/USN-3762-2 https://usn.ubuntu.com/3696-1/ https://usn.ubuntu.com/3696-2/ https://usn.ubuntu.com/3762-1/ https://usn.ubuntu.com/3762-2/
|
| kernel-headers | CVE-2017-14051 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/100571 https://access.redhat.com/security/cve/CVE-2017-14051 https://bugzilla.kernel.org/show_bug.cgi?id=194061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14051 https://github.com/torvalds/linux/commit/e6f77540c067b48dee10f1e33678415bfcc89017 https://linux.oracle.com/cve/CVE-2017-14051.html https://linux.oracle.com/errata/ELSA-2019-4317.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://patchwork.kernel.org/patch/9929625/ https://ubuntu.com/security/notices/USN-3469-1 https://ubuntu.com/security/notices/USN-3469-2 https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/
|
| kernel-headers | CVE-2017-14106 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100878 http://www.securitytracker.com/id/1039549 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/errata/RHSA-2017:3200 https://access.redhat.com/errata/RHSA-2018:2172 https://access.redhat.com/security/cve/CVE-2017-14106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8 https://github.com/torvalds/linux/commit/499350a5a6e7512d9ed369ed63a4244b6536f4f8 https://linux.oracle.com/cve/CVE-2017-14106.html https://linux.oracle.com/errata/ELSA-2018-4235.html https://ubuntu.com/security/notices/USN-3443-1 https://ubuntu.com/security/notices/USN-3443-2 https://ubuntu.com/security/notices/USN-3443-3 https://ubuntu.com/security/notices/USN-3444-1 https://ubuntu.com/security/notices/USN-3444-2 https://ubuntu.com/security/notices/USN-3445-1 https://ubuntu.com/security/notices/USN-3445-2 https://www.mail-archive.com/netdev@vger.kernel.org/msg186255.html
|
| kernel-headers | CVE-2017-14489 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/101011 https://access.redhat.com/security/cve/CVE-2017-14489 https://bugzilla.redhat.com/show_bug.cgi?id=1490421 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14489 https://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi.git/commit/drivers/scsi/scsi_transport_iscsi.c?h=fixes&id=c88f0e6b06f4092995688211a631bb436125d77b https://linux.oracle.com/cve/CVE-2017-14489.html https://linux.oracle.com/errata/ELSA-2017-3637.html https://patchwork.kernel.org/patch/9923803/ https://ubuntu.com/security/notices/USN-3469-1 https://ubuntu.com/security/notices/USN-3469-2 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/ https://www.exploit-db.com/exploits/42932/
|
| kernel-headers | CVE-2017-14497 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=edbd58be15a957f6a760c4a514cd475217eb97fd http://seclists.org/oss-sec/2017/q3/476 http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100871 http://www.securitytracker.com/id/1039371 http://www.securitytracker.com/id/1040106 https://access.redhat.com/security/cve/CVE-2017-14497 https://bugzilla.redhat.com/show_bug.cgi?id=1492593 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14497 https://github.com/torvalds/linux/commit/edbd58be15a957f6a760c4a514cd475217eb97fd https://marc.info/?l=linux-kernel&m=150394500728906&w=2 https://marc.info/?t=150394517700001&r=1&w=2 https://source.android.com/security/bulletin/2018-01-01
|
| kernel-headers | CVE-2017-15128 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df http://post-office.corp.redhat.com/archives/rhkernel-list/2017-October/msg09574.html https://access.redhat.com/security/cve/CVE-2017-15128 https://bugzilla.redhat.com/show_bug.cgi?id=1525222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15128 https://github.com/torvalds/linux/commit/1e3921471354244f70fe268586ff94a97a6dd4df https://linux.oracle.com/cve/CVE-2017-15128.html https://linux.oracle.com/errata/ELSA-2019-4850.html https://marc.info/?l=linux-mm&m=150819356125109 https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.12
|
| kernel-headers | CVE-2017-15265 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=71105998845fb012937332fe2e806d443c09e026 http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.8 http://www.openwall.com/lists/oss-security/2017/10/11/3 http://www.securityfocus.com/bid/101288 http://www.securitytracker.com/id/1039561 https://access.redhat.com/errata/RHSA-2018:0676 https://access.redhat.com/errata/RHSA-2018:1062 https://access.redhat.com/errata/RHSA-2018:1130 https://access.redhat.com/errata/RHSA-2018:1170 https://access.redhat.com/errata/RHSA-2018:2390 https://access.redhat.com/errata/RHSA-2018:3822 https://access.redhat.com/errata/RHSA-2018:3823 https://access.redhat.com/security/cve/CVE-2017-15265 https://bugzilla.suse.com/show_bug.cgi?id=1062520 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265 https://github.com/torvalds/linux/commit/71105998845fb012937332fe2e806d443c09e026 https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://linux.oracle.com/cve/CVE-2017-15265.html https://linux.oracle.com/errata/ELSA-2018-2390.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://source.android.com/security/bulletin/2018-02-01 https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3698-1 https://ubuntu.com/security/notices/USN-3698-2 https://usn.ubuntu.com/3698-1/ https://usn.ubuntu.com/3698-2/ https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
|
| kernel-headers | CVE-2017-15299 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/errata/RHSA-2018:0654 https://access.redhat.com/security/cve/CVE-2017-15299 https://bugzilla.redhat.com/show_bug.cgi?id=1498016 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15299 https://linux.oracle.com/cve/CVE-2017-15299.html https://linux.oracle.com/errata/ELSA-2018-4110.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://marc.info/?t=150654188100001&r=1&w=2 https://marc.info/?t=150783958600011&r=1&w=2 https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3507-1 https://ubuntu.com/security/notices/USN-3507-2 https://ubuntu.com/security/notices/USN-3798-1 https://ubuntu.com/security/notices/USN-3798-2 https://usn.ubuntu.com/3798-1/ https://usn.ubuntu.com/3798-2/ https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1499828.html
|
| kernel-headers | CVE-2017-16528 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16528 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16528 https://github.com/torvalds/linux/commit/fc27fe7e8deef2f37cba3f2be2d52b6ca5eb9d57 https://groups.google.com/d/msg/syzkaller/kuZzDHGkQu8/5du20rZEAAAJ https://linux.oracle.com/cve/CVE-2017-16528.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/
|
| kernel-headers | CVE-2017-17807 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4dca6ea1d9432052afb06baf2e3ae78188a4410b http://www.securityfocus.com/bid/102301 https://access.redhat.com/security/cve/CVE-2017-17807 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807 https://github.com/torvalds/linux/commit/4dca6ea1d9432052afb06baf2e3ae78188a4410b https://linux.oracle.com/cve/CVE-2017-17807.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3620-1 https://ubuntu.com/security/notices/USN-3620-2 https://ubuntu.com/security/notices/USN-3632-1 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3620-1/ https://usn.ubuntu.com/3620-2/ https://usn.ubuntu.com/3632-1/ https://www.debian.org/security/2017/dsa-4073 https://www.debian.org/security/2018/dsa-4082 https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.6
|
| kernel-headers | CVE-2017-18079 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=340d394a789518018f834ff70f7534fc463d3226 http://www.securityfocus.com/bid/102895 https://access.redhat.com/security/cve/CVE-2017-18079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18079 https://github.com/torvalds/linux/commit/340d394a789518018f834ff70f7534fc463d3226 https://linux.oracle.com/cve/CVE-2017-18079.html https://linux.oracle.com/errata/ELSA-2019-4317.html https://ubuntu.com/security/notices/USN-3655-1 https://ubuntu.com/security/notices/USN-3655-2 https://usn.ubuntu.com/3655-1/ https://usn.ubuntu.com/3655-2/ https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.4
|
| kernel-headers | CVE-2017-18551 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html https://access.redhat.com/security/cve/CVE-2017-18551 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.15 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551 https://git.kernel.org/linus/89c6efa61f5709327ecfa24bff18e57a4e80c7fa https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89c6efa61f5709327ecfa24bff18e57a4e80c7fa https://linux.oracle.com/cve/CVE-2017-18551.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://support.f5.com/csp/article/K48073202?utm_source=f5support&utm_medium=RSS
|
| kernel-headers | CVE-2017-5972 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://seclists.org/oss-sec/2017/q1/573 http://www.securityfocus.com/bid/96231 https://access.redhat.com/security/cve/CVE-2017-5972 https://access.redhat.com/security/cve/cve-2017-5972 https://bugzilla.redhat.com/show_bug.cgi?id=1422081 https://cxsecurity.com/issue/WLB-2017020112 https://githubengineering.com/syn-flood-mitigation-with-synsanity/ https://packetstormsecurity.com/files/141083/CentOS7-Kernel-Denial-Of-Service.html https://security-tracker.debian.org/tracker/CVE-2017-5972 https://www.exploit-db.com/exploits/41350/
|
| kernel-headers | CVE-2017-7541 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f44c9a41386729fea410e688959ddaa9d51be7c http://openwall.com/lists/oss-security/2017/07/24/2 http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.3 http://www.securityfocus.com/bid/99955 http://www.securitytracker.com/id/1038981 https://access.redhat.com/errata/RHSA-2017:2863 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/security/cve/CVE-2017-7541 https://bugzilla.novell.com/show_bug.cgi?id=1049645 https://bugzilla.redhat.com/show_bug.cgi?id=1473198 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541 https://github.com/torvalds/linux/commit/8f44c9a41386729fea410e688959ddaa9d51be7c https://linux.oracle.com/cve/CVE-2017-7541.html https://linux.oracle.com/errata/ELSA-2017-3629.html https://source.android.com/security/bulletin/2017-11-01 https://ubuntu.com/security/notices/USN-3405-1 https://ubuntu.com/security/notices/USN-3405-2 https://ubuntu.com/security/notices/USN-3419-1 https://ubuntu.com/security/notices/USN-3419-2 https://ubuntu.com/security/notices/USN-3422-1 https://ubuntu.com/security/notices/USN-3422-2 https://www.spinics.net/lists/stable/msg180994.html
|
| kernel-headers | CVE-2017-7542 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6399f1fae4ec29fab5ec76070435555e256ca3a6 http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.securityfocus.com/bid/99953 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/errata/RHSA-2018:0169 https://access.redhat.com/security/cve/CVE-2017-7542 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542 https://github.com/torvalds/linux/commit/6399f1fae4ec29fab5ec76070435555e256ca3a6 https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 https://linux.oracle.com/cve/CVE-2017-7542.html https://linux.oracle.com/errata/ELSA-2018-0169.html https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/
|
| kernel-headers | CVE-2017-7558 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://seclists.org/oss-sec/2017/q3/338 http://www.securityfocus.com/bid/100466 http://www.securitytracker.com/id/1039221 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/security/cve/CVE-2017-7558 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7558 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7558 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/net/sctp/socket.c?id=ee6c88bb754e3d363e568da78086adfedb692447 https://linux.oracle.com/cve/CVE-2017-7558.html https://linux.oracle.com/errata/ELSA-2017-2930.html https://marc.info/?l=linux-netdev&m=150348777122761&w=2 https://www.debian.org/security/2017/dsa-3981
|
| kernel-headers | CVE-2017-9211 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9933e113c2e87a9f46a40fde8dafbf801dca1ab9 https://access.redhat.com/security/cve/CVE-2017-9211 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9211 https://git.kernel.org/linus/9933e113c2e87a9f46a40fde8dafbf801dca1ab9 https://github.com/torvalds/linux/commit/9933e113c2e87a9f46a40fde8dafbf801dca1ab9 https://patchwork.kernel.org/patch/9718933/
|
| kernel-headers | CVE-2018-17977 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/105539 https://access.redhat.com/security/cve/CVE-2018-17977 https://bugzilla.suse.com/show_bug.cgi?id=1111609 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17977 https://www.openwall.com/lists/oss-security/2018/10/05/5
|
| kernel-headers | CVE-2018-20169 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/security/cve/CVE-2018-20169 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169 https://git.kernel.org/linus/704620afc70cf47abb9d6a1a57f3825d2bca49cf https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf https://linux.oracle.com/cve/CVE-2018-20169.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html https://ubuntu.com/security/notices/USN-3879-1 https://ubuntu.com/security/notices/USN-3879-2 https://ubuntu.com/security/notices/USN-4094-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/3879-1/ https://usn.ubuntu.com/3879-2/ https://usn.ubuntu.com/4094-1/ https://usn.ubuntu.com/4118-1/
|
| kernel-headers | CVE-2018-20836 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html http://www.securityfocus.com/bid/108196 https://access.redhat.com/security/cve/CVE-2018-20836 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b90cd6f2b905905fb42671009dc0e27c310a16ae https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae https://linux.oracle.com/cve/CVE-2018-20836.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://seclists.org/bugtraq/2019/Aug/13 https://seclists.org/bugtraq/2019/Aug/18 https://security.netapp.com/advisory/ntap-20190719-0003/ https://support.f5.com/csp/article/K11225249 https://ubuntu.com/security/notices/USN-4076-1 https://usn.ubuntu.com/4076-1/ https://www.debian.org/security/2019/dsa-4495 https://www.debian.org/security/2019/dsa-4497
|
| kernel-headers | CVE-2018-7191 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html http://www.securityfocus.com/bid/108380 https://access.redhat.com/security/cve/CVE-2018-7191 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1743792 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1748846 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.14 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ad646c81b2182f7fa67ec0c8c825e0ee165696d https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c25f65fd1e42685f7ccd80e0621829c105785d9 https://git.kernel.org/linus/0ad646c81b2182f7fa67ec0c8c825e0ee165696d https://git.kernel.org/linus/5c25f65fd1e42685f7ccd80e0621829c105785d9 https://github.com/torvalds/linux/commit/0ad646c81b2182f7fa67ec0c8c825e0ee165696d https://github.com/torvalds/linux/commit/5c25f65fd1e42685f7ccd80e0621829c105785d9 https://linux.oracle.com/cve/CVE-2018-7191.html https://linux.oracle.com/errata/ELSA-2020-1016.html
|
| kernel-headers | CVE-2019-10207 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-10207 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207 https://linux.oracle.com/cve/CVE-2019-10207.html https://linux.oracle.com/errata/ELSA-2021-9534.html https://lore.kernel.org/linux-bluetooth/20190729122215.9948-1-vdronov@redhat.com/ https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4145-1 https://ubuntu.com/security/notices/USN-4147-1 https://www.openwall.com/lists/oss-security/2019/07/25/1
|
| kernel-headers | CVE-2019-11884 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00037.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html http://www.securityfocus.com/bid/108299 https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/errata/RHSA-2020:0740 https://access.redhat.com/security/cve/CVE-2019-11884 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.15 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1616a5ac99ede5d605047a9012481ce7ff18b16 https://git.kernel.org/linus/a1616a5ac99ede5d605047a9012481ce7ff18b16 https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16 https://linux.oracle.com/cve/CVE-2019-11884.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPWHQHNM2MSGO3FDJVIQXQNKYVR7TV45/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAYXGGJUUYPOMCBZGGDCUZFLUU3JOZG5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PF2PDXUGOFEOTPVEACKFIHQB6O4XUIZD/ https://seclists.org/bugtraq/2019/Jun/26 https://ubuntu.com/security/notices/USN-4068-1 https://ubuntu.com/security/notices/USN-4068-2 https://ubuntu.com/security/notices/USN-4069-1 https://ubuntu.com/security/notices/USN-4069-2 https://ubuntu.com/security/notices/USN-4076-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4068-1/ https://usn.ubuntu.com/4068-2/ https://usn.ubuntu.com/4069-1/ https://usn.ubuntu.com/4069-2/ https://usn.ubuntu.com/4076-1/ https://usn.ubuntu.com/4118-1/ https://www.debian.org/security/2019/dsa-4465
|
| kernel-headers | CVE-2019-12382 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html http://www.securityfocus.com/bid/108474 https://access.redhat.com/security/cve/CVE-2019-12382 https://cgit.freedesktop.org/drm/drm-misc/commit/?id=9f1f1a2dab38d4ce87a13565cf4dc1b73bef3a5f https://linux.oracle.com/cve/CVE-2019-12382.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/ https://lkml.org/lkml/2019/5/24/843 https://lore.kernel.org/lkml/87o93u7d3s.fsf@intel.com/ https://salsa.debian.org/kernel-team/kernel-sec/blob/master/retired/CVE-2019-12382
|
| kernel-headers | CVE-2019-13233 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/security/cve/CVE-2019-13233 https://bugs.chromium.org/p/project-zero/issues/detail?id=1879 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de9f869616dd95e95c00bdd6b0fcd3421e8a4323 https://github.com/torvalds/linux/commit/de9f869616dd95e95c00bdd6b0fcd3421e8a4323 https://linux.oracle.com/cve/CVE-2019-13233.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://seclists.org/bugtraq/2019/Aug/13 https://security.netapp.com/advisory/ntap-20190806-0001/ https://support.f5.com/csp/article/K13331647?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4093-1 https://ubuntu.com/security/notices/USN-4094-1 https://ubuntu.com/security/notices/USN-4117-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4093-1/ https://usn.ubuntu.com/4094-1/ https://usn.ubuntu.com/4117-1/ https://usn.ubuntu.com/4118-1/ https://www.debian.org/security/2019/dsa-4495
|
| kernel-headers | CVE-2019-13631 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.securityfocus.com/bid/109291 https://access.redhat.com/security/cve/CVE-2019-13631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13631 https://linux.oracle.com/cve/CVE-2019-13631.html https://linux.oracle.com/errata/ELSA-2019-4746.html https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQ5BQKTI24DPSVKPOIMMGDTFKCF6ASXT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TUXTJSLIQBOJTQDMTUQTQKUWWAJLFVEY/ https://patchwork.kernel.org/patch/11040813/ https://seclists.org/bugtraq/2019/Aug/13 https://seclists.org/bugtraq/2019/Aug/18 https://seclists.org/bugtraq/2019/Aug/26 https://security.netapp.com/advisory/ntap-20190806-0001/ https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4145-1 https://ubuntu.com/security/notices/USN-4147-1 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/ https://usn.ubuntu.com/4145-1/ https://usn.ubuntu.com/4147-1/ https://www.debian.org/security/2019/dsa-4495 https://www.debian.org/security/2019/dsa-4497
|
| kernel-headers | CVE-2019-13648 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.openwall.com/lists/oss-security/2019/07/30/1 https://access.redhat.com/security/cve/CVE-2019-13648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648 https://git.kernel.org/torvalds/c/f16d80b75a096c52354c6e0a574993f3b0dfbdfe https://linux.oracle.com/cve/CVE-2019-13648.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRK2MW223KQZ76DKEF2BZFN6TCXLZLDS/ https://patchwork.ozlabs.org/patch/1133904/ https://seclists.org/bugtraq/2019/Aug/13 https://seclists.org/bugtraq/2019/Aug/18 https://seclists.org/bugtraq/2019/Aug/26 https://security.netapp.com/advisory/ntap-20190806-0001/ https://ubuntu.com/security/notices/USN-4114-1 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4116-1 https://usn.ubuntu.com/4114-1/ https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4116-1/ https://www.debian.org/security/2019/dsa-4495 https://www.debian.org/security/2019/dsa-4497
|
| kernel-headers | CVE-2019-14283 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...Changelog Upstream commit http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html https://access.redhat.com/security/cve/CVE-2019-14283 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=da99466ac243f15fbba65bd261bfc75ffa1532b6 https://git.kernel.org/linus/da99466ac243f15fbba65bd261bfc75ffa1532b6 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=da99466ac243f15fbba65bd261bfc75ffa1532b6 https://github.com/torvalds/linux/commit/da99466ac243f15fbba65bd261bfc75ffa1532b6 https://linux.oracle.com/cve/CVE-2019-14283.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://seclists.org/bugtraq/2019/Aug/13 https://seclists.org/bugtraq/2019/Aug/18 https://seclists.org/bugtraq/2019/Aug/26 https://security.netapp.com/advisory/ntap-20190905-0002/ https://ubuntu.com/security/notices/USN-4114-1 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4116-1 https://ubuntu.com/security/notices/USN-4117-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4114-1/ https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4116-1/ https://usn.ubuntu.com/4117-1/ https://usn.ubuntu.com/4118-1/ https://www.debian.org/security/2019/dsa-4495 https://www.debian.org/security/2019/dsa-4497
|
| kernel-headers | CVE-2019-14284 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html http://packetstormsecurity.com/files/154059/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://packetstormsecurity.com/files/154408/Kernel-Live-Patch-Security-Notice-LSN-0055-1.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html https://access.redhat.com/security/cve/CVE-2019-14284 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14284 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3554aeb991214cbfafd17d55e2bfddb50282e32 https://git.kernel.org/linus/f3554aeb991214cbfafd17d55e2bfddb50282e32 https://github.com/torvalds/linux/commit/f3554aeb991214cbfafd17d55e2bfddb50282e32 https://linux.oracle.com/cve/CVE-2019-14284.html https://linux.oracle.com/errata/ELSA-2019-4855.html https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://seclists.org/bugtraq/2019/Aug/13 https://seclists.org/bugtraq/2019/Aug/18 https://seclists.org/bugtraq/2019/Aug/26 https://security.netapp.com/advisory/ntap-20190905-0002/ https://ubuntu.com/security/notices/USN-4114-1 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4116-1 https://ubuntu.com/security/notices/USN-4117-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4114-1/ https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4116-1/ https://usn.ubuntu.com/4117-1/ https://usn.ubuntu.com/4118-1/ https://www.debian.org/security/2019/dsa-4495 https://www.debian.org/security/2019/dsa-4497
|
| kernel-headers | CVE-2019-14615 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html http://seclists.org/fulldisclosure/2020/Mar/31 https://access.redhat.com/security/cve/CVE-2019-14615 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14615 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc8a76a152c5f9ef3b48104154a65a68a8b76946 https://linux.oracle.com/cve/CVE-2019-14615.html https://linux.oracle.com/errata/ELSA-2020-5569.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://support.apple.com/kb/HT211100 https://ubuntu.com/security/notices/USN-4253-1 https://ubuntu.com/security/notices/USN-4253-2 https://ubuntu.com/security/notices/USN-4254-1 https://ubuntu.com/security/notices/USN-4254-2 https://ubuntu.com/security/notices/USN-4255-1 https://ubuntu.com/security/notices/USN-4255-2 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4285-1 https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4253-1/ https://usn.ubuntu.com/4253-2/ https://usn.ubuntu.com/4254-1/ https://usn.ubuntu.com/4254-2/ https://usn.ubuntu.com/4255-1/ https://usn.ubuntu.com/4255-2/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4285-1/ https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00314.html
|
| kernel-headers | CVE-2019-14814 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.openwall.com/lists/oss-security/2019/08/28/1 https://access.redhat.com/errata/RHSA-2020:0174 https://access.redhat.com/errata/RHSA-2020:0328 https://access.redhat.com/errata/RHSA-2020:0339 https://access.redhat.com/security/cve/CVE-2019-14814 https://access.redhat.com/security/cve/cve-2019-14814 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14814 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a https://linux.oracle.com/cve/CVE-2019-14814.html https://linux.oracle.com/errata/ELSA-2020-5676.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/ https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/ https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20191031-0005/ https://ubuntu.com/security/notices/USN-4157-1 https://ubuntu.com/security/notices/USN-4157-2 https://ubuntu.com/security/notices/USN-4162-1 https://ubuntu.com/security/notices/USN-4162-2 https://ubuntu.com/security/notices/USN-4163-1 https://ubuntu.com/security/notices/USN-4163-2 https://usn.ubuntu.com/4157-1/ https://usn.ubuntu.com/4157-2/ https://usn.ubuntu.com/4162-1/ https://usn.ubuntu.com/4162-2/ https://usn.ubuntu.com/4163-1/ https://usn.ubuntu.com/4163-2/ https://www.openwall.com/lists/oss-security/2019/08/28/1
|
| kernel-headers | CVE-2019-14815 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...https://access.redhat.com/errata/RHSA-2020:0174 https://access.redhat.com/errata/RHSA-2020:0328 https://access.redhat.com/errata/RHSA-2020:0339 https://access.redhat.com/security/cve/CVE-2019-14815 https://access.redhat.com/security/cve/cve-2019-14815 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14815 https://github.com/torvalds/linux/commit/7caac62ed598a196d6ddf8d9c121e12e082cac3a https://linux.oracle.com/cve/CVE-2019-14815.html https://linux.oracle.com/errata/ELSA-2020-5676.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com https://lore.kernel.org/linux-wireless/20190828020751.13625-1-huangwenabc@gmail.com/ https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4157-1 https://ubuntu.com/security/notices/USN-4157-2 https://ubuntu.com/security/notices/USN-4162-1 https://ubuntu.com/security/notices/USN-4162-2 https://www.openwall.com/lists/oss-security/2019/08/28/1
|
| kernel-headers | CVE-2019-14898 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1062.12.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-14898 https://bugs.chromium.org/p/project-zero/issues/detail?id=1790 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14898 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.114 https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.37 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10 https://linux.oracle.com/cve/CVE-2019-14898.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://security.netapp.com/advisory/ntap-20200608-0001/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-15213 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://www.openwall.com/lists/oss-security/2019/08/20/2 https://access.redhat.com/security/cve/CVE-2019-15213 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15213 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cf97230cd5f36b7665099083272595c55d72be7 https://linux.oracle.com/cve/CVE-2019-15213.html https://linux.oracle.com/errata/ELSA-2019-4872.html https://lore.kernel.org/linux-media/fe983331d14442a96db3f71066ca0488a8921840.camel@decadent.org.uk/ https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=a53c9c9dd2981bfdbfbcbc1ddbd35595eda8bced
|
| kernel-headers | CVE-2019-15214 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://www.openwall.com/lists/oss-security/2019/08/20/2 https://access.redhat.com/security/cve/CVE-2019-15214 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15214 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f7221acddfe1caa9ff09b3a8158c39b2fdeac https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c2f870890fd28e023b0fcf49dcee333f2c8bad7 https://linux.oracle.com/cve/CVE-2019-15214.html https://linux.oracle.com/errata/ELSA-2020-5755.html https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=75903e0021cef79bc434d068b5169b599b2a46a9 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/
|
| kernel-headers | CVE-2019-15505 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-15505 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505 https://git.linuxtv.org/media_tree.git/commit/?id=0c4df39e504bf925ab666132ac3c98d6cbbe380b https://linux.oracle.com/cve/CVE-2019-15505.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3RUDQJXRJQVGHCGR4YZWTQ3ECBI7TXH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4JZ6AEUKFWBHQAROGMQARJ274PQP2QP/ https://lore.kernel.org/linux-media/20190821104408.w7krumcglxo6fz5q@gofer.mess.org/ https://lore.kernel.org/lkml/b9b256cb-95f2-5fa1-9956-5a602a017c11@gmail.com/ https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20190905-0002/ https://support.f5.com/csp/article/K28222050 https://support.f5.com/csp/article/K28222050?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4157-1 https://ubuntu.com/security/notices/USN-4157-2 https://ubuntu.com/security/notices/USN-4162-1 https://ubuntu.com/security/notices/USN-4162-2 https://ubuntu.com/security/notices/USN-4163-1 https://ubuntu.com/security/notices/USN-4163-2 https://usn.ubuntu.com/4157-1/ https://usn.ubuntu.com/4157-2/ https://usn.ubuntu.com/4162-1/ https://usn.ubuntu.com/4162-2/ https://usn.ubuntu.com/4163-1/ https://usn.ubuntu.com/4163-2/
|
| kernel-headers | CVE-2019-15916 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/errata/RHSA-2020:0740 https://access.redhat.com/security/cve/CVE-2019-15916 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916 https://git.kernel.org/linus/895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=895a5e96dbd6386c8e78e5b78e067dcc67b7f0ab https://linux.oracle.com/cve/CVE-2019-15916.html https://linux.oracle.com/errata/ELSA-2020-5532.html https://security.netapp.com/advisory/ntap-20191004-0001/ https://support.f5.com/csp/article/K57418558?utm_source=f5support&utm_medium=RSS
|
| kernel-headers | CVE-2019-15917 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-15917 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917 https://git.kernel.org/linus/56897b217a1d0a91c9920cb418d6b3fe922f590a https://github.com/torvalds/linux/commit/56897b217a1d0a91c9920cb418d6b3fe922f590a https://linux.oracle.com/cve/CVE-2019-15917.html https://linux.oracle.com/errata/ELSA-2020-5533.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://seclists.org/bugtraq/2020/Jan/10 https://security.netapp.com/advisory/ntap-20191004-0001/
|
| kernel-headers | CVE-2019-16746 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-16746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746 https://linux.oracle.com/cve/CVE-2019-16746.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TASE2ESEZAER6DTZH3DJ4K2JNO46TVL7/ https://marc.info/?l=linux-wireless&m=156901391225058&w=2 https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20191031-0005/ https://ubuntu.com/security/notices/USN-4183-1 https://ubuntu.com/security/notices/USN-4186-1 https://ubuntu.com/security/notices/USN-4209-1 https://ubuntu.com/security/notices/USN-4210-1 https://usn.ubuntu.com/4183-1/ https://usn.ubuntu.com/4186-1/ https://usn.ubuntu.com/4209-1/ https://usn.ubuntu.com/4210-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-17053 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-17053 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053 https://git.kernel.org/linus/e69dbd4619e7674c1679cba49afd9dd9ac347eef https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e69dbd4619e7674c1679cba49afd9dd9ac347eef https://linux.oracle.com/cve/CVE-2019-17053.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/ https://seclists.org/bugtraq/2019/Nov/11 https://ubuntu.com/security/notices/USN-4184-1 https://ubuntu.com/security/notices/USN-4185-1 https://ubuntu.com/security/notices/USN-4185-2 https://ubuntu.com/security/notices/USN-4186-1 https://ubuntu.com/security/notices/USN-4186-2 https://usn.ubuntu.com/4184-1/ https://usn.ubuntu.com/4185-1/ https://usn.ubuntu.com/4185-2/ https://usn.ubuntu.com/4186-1/ https://usn.ubuntu.com/4186-2/
|
| kernel-headers | CVE-2019-17055 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/errata/RHSA-2020:0790 https://access.redhat.com/security/cve/CVE-2019-17055 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055 https://git.kernel.org/linus/b91ee4aa2a2199ba4d4650706c272985a5a32d80 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0edc3f703f7bcaf550774b5d43ab727bcd0fe06b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b91ee4aa2a2199ba4d4650706c272985a5a32d80 https://linux.oracle.com/cve/CVE-2019-17055.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JNEWGIK7QA24OIUUL67QZNJN52NB7T/ https://seclists.org/bugtraq/2019/Nov/11 https://ubuntu.com/security/notices/USN-4184-1 https://ubuntu.com/security/notices/USN-4185-1 https://ubuntu.com/security/notices/USN-4185-2 https://ubuntu.com/security/notices/USN-4186-1 https://ubuntu.com/security/notices/USN-4186-2 https://usn.ubuntu.com/4184-1/ https://usn.ubuntu.com/4185-1/ https://usn.ubuntu.com/4185-2/ https://usn.ubuntu.com/4186-1/ https://usn.ubuntu.com/4186-2/
|
| kernel-headers | CVE-2019-18660 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.openwall.com/lists/oss-security/2019/11/27/1 https://access.redhat.com/errata/RHSA-2020:0174 https://access.redhat.com/security/cve/CVE-2019-18660 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad https://linux.oracle.com/cve/CVE-2019-18660.html https://linux.oracle.com/errata/ELSA-2020-2933.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/ https://seclists.org/bugtraq/2020/Jan/10 https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4225-2 https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://ubuntu.com/security/notices/USN-4228-1 https://ubuntu.com/security/notices/USN-4228-2 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4225-2/ https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/ https://usn.ubuntu.com/4228-1/ https://usn.ubuntu.com/4228-2/ https://www.openwall.com/lists/oss-security/2019/11/27/1
|
| kernel-headers | CVE-2019-18808 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://www.openwall.com/lists/oss-security/2021/09/14/1 https://access.redhat.com/security/cve/CVE-2019-18808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808 https://github.com/torvalds/linux/commit/128c66429247add5128c03dc1e144ca56f05a4e2 https://linux.oracle.com/cve/CVE-2019-18808.html https://linux.oracle.com/errata/ELSA-2020-4431.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYIFGYEDQXP5DVJQQUARQRK2PXKBKQGY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWWOOJKZ4NQYN4RMFIVJ3ZIXKJJI3MKP/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4525-1 https://ubuntu.com/security/notices/USN-4526-1 https://usn.ubuntu.com/4525-1/ https://usn.ubuntu.com/4526-1/
|
| kernel-headers | CVE-2019-19036 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-19036 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19036 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036 https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4414-1 https://ubuntu.com/security/notices/USN-4439-1 https://usn.ubuntu.com/4414-1/ https://usn.ubuntu.com/4439-1/
|
| kernel-headers | CVE-2019-19046 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19046 https://bugzilla.suse.com/show_bug.cgi?id=1157304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046 https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab https://linux.oracle.com/cve/CVE-2019-19046.html https://linux.oracle.com/errata/ELSA-2020-4431.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://ubuntu.com/security/notices/USN-4302-1 https://ubuntu.com/security/notices/USN-4319-1 https://ubuntu.com/security/notices/USN-4325-1 https://usn.ubuntu.com/4302-1/ https://usn.ubuntu.com/4319-1/ https://usn.ubuntu.com/4325-1/
|
| kernel-headers | CVE-2019-19055 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19055 https://bugzilla.suse.com/show_bug.cgi?id=1157319 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055 https://github.com/torvalds/linux/commit/1399c59fa92984836db90538cf92397fe7caaa57 https://linux.oracle.com/cve/CVE-2019-19055.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4225-2 https://ubuntu.com/security/notices/USN-4226-1 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4225-2/ https://usn.ubuntu.com/4226-1/
|
| kernel-headers | CVE-2019-19077 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19077 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19077 https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053 https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4284-1 https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4284-1/
|
| kernel-headers | CVE-2019-19332 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-19332 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19332 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332 https://git.kernel.org/linus/433f4ba1904100da65a311033f17a9bf586b287e https://linux.oracle.com/cve/CVE-2019-19332.html https://linux.oracle.com/errata/ELSA-2020-5535.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lore.kernel.org/kvm/000000000000ea5ec20598d90e50@google.com/ https://security.netapp.com/advisory/ntap-20200204-0002/ https://ubuntu.com/security/notices/USN-4254-1 https://ubuntu.com/security/notices/USN-4254-2 https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4254-1/ https://usn.ubuntu.com/4254-2/ https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/ https://www.openwall.com/lists/oss-security/2019/12/16/1
|
| kernel-headers | CVE-2019-19338 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1062.18.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19338 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19338 https://linux.oracle.com/cve/CVE-2019-19338.html https://linux.oracle.com/errata/ELSA-2020-0834.html https://nvd.nist.gov/vuln/detail/CVE-2019-19338 https://software.intel.com/security-software-guidance/insights/deep-dive-intel-transactional-synchronization-extensions-intel-tsx-asynchronous-abort https://www.openwall.com/lists/oss-security/2019/12/10/3
|
| kernel-headers | CVE-2019-19377 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19377 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19377 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377 https://linux.oracle.com/cve/CVE-2019-19377.html https://linux.oracle.com/errata/ELSA-2020-5913.html https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4367-1 https://ubuntu.com/security/notices/USN-4369-1 https://ubuntu.com/security/notices/USN-4414-1 https://usn.ubuntu.com/4367-1/ https://usn.ubuntu.com/4369-1/ https://usn.ubuntu.com/4414-1/
|
| kernel-headers | CVE-2019-19447 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-19447 https://bugzilla.kernel.org/show_bug.cgi?id=205433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19447 https://linux.oracle.com/cve/CVE-2019-19447.html https://linux.oracle.com/errata/ELSA-2021-9002.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lore.kernel.org/r/20191112032903.8828-1-tytso@mit.edu https://security.netapp.com/advisory/ntap-20200103-0001/
|
| kernel-headers | CVE-2019-19523 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19523 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523 https://git.kernel.org/linus/44efc269db7929f6275a1fa927ef082e533ecde0 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=44efc269db7929f6275a1fa927ef082e533ecde0 https://linux.oracle.com/cve/CVE-2019-19523.html https://linux.oracle.com/errata/ELSA-2021-1578.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
|
| kernel-headers | CVE-2019-19524 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19524 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524 https://git.kernel.org/linus/fa3a5a1880c91bb92594ad42dfe9eedad7996b86 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86 https://linux.oracle.com/cve/CVE-2019-19524.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://seclists.org/bugtraq/2020/Jan/10 https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4225-2 https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://ubuntu.com/security/notices/USN-4228-1 https://ubuntu.com/security/notices/USN-4228-2 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4225-2/ https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/ https://usn.ubuntu.com/4228-1/ https://usn.ubuntu.com/4228-2/
|
| kernel-headers | CVE-2019-19527 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19527 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19527 https://git.kernel.org/linus/6d4472d7bec39917b54e4e80245784ea5d60ce49 https://git.kernel.org/linus/9c09b214f30e3c11f9b0b03f89442df03643794d https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d https://linux.oracle.com/cve/CVE-2019-19527.html https://linux.oracle.com/errata/ELSA-2020-5709.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
|
| kernel-headers | CVE-2019-19528 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19528 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19528 https://git.kernel.org/linus/edc4746f253d907d048de680a621e121517f484b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c468a8aa790e0dfe0a7f8a39db282d39c2c00b46 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=edc4746f253d907d048de680a621e121517f484b https://linux.oracle.com/cve/CVE-2019-19528.html https://linux.oracle.com/errata/ELSA-2021-1578.html
|
| kernel-headers | CVE-2019-19530 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://seclists.org/oss-sec/2019/q4/115 http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19530 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530 https://git.kernel.org/linus/c52873e5a1ef72f845526d9f6a50704433f9c625 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625 https://linux.oracle.com/cve/CVE-2019-19530.html https://linux.oracle.com/errata/ELSA-2020-5956.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
|
| kernel-headers | CVE-2019-19534 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19534 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534 https://git.kernel.org/linus/f7a1337f0d29b98733c8824e165fca3371d7d4fd https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7a1337f0d29b98733c8824e165fca3371d7d4fd https://linux.oracle.com/cve/CVE-2019-19534.html https://linux.oracle.com/errata/ELSA-2020-5755.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4225-2 https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://ubuntu.com/security/notices/USN-4228-1 https://ubuntu.com/security/notices/USN-4228-2 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4225-2/ https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/ https://usn.ubuntu.com/4228-1/ https://usn.ubuntu.com/4228-2/
|
| kernel-headers | CVE-2019-19536 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19536 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19536 https://git.kernel.org/linus/ead16e53c2f0ed946d82d4037c630e2f60f4ab69 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ead16e53c2f0ed946d82d4037c630e2f60f4ab69 https://linux.oracle.com/cve/CVE-2019-19536.html https://linux.oracle.com/errata/ELSA-2020-5755.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://www.nxp.com/docs/en/reference-manual/BCANPSV2.pdf
|
| kernel-headers | CVE-2019-19537 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19537 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537 https://git.kernel.org/linus/303911cfc5b95d33687d9046133ff184cf5043ff https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff https://linux.oracle.com/cve/CVE-2019-19537.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
|
| kernel-headers | CVE-2019-19767 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-19767 https://bugzilla.kernel.org/show_bug.cgi?id=205609 https://bugzilla.kernel.org/show_bug.cgi?id=205707 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a https://git.kernel.org/linus/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a https://github.com/torvalds/linux/commit/4ea99936a1630f51fc3a2d61a58ec4a1c4b7d55a https://linux.oracle.com/cve/CVE-2019-19767.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2019-19770 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html https://access.redhat.com/security/cve/CVE-2019-19770 https://bugzilla.kernel.org/show_bug.cgi?id=205713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19770 https://github.com/mcgrof/break-blktrace https://linux.oracle.com/cve/CVE-2019-19770.html https://linux.oracle.com/errata/ELSA-2020-4431.html https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof@kernel.org/ https://lore.kernel.org/linux-block/20200419194529.4872-1-mcgrof@kernel.org/ https://lore.kernel.org/linux-block/20200516031956.2605-1-mcgrof@kernel.org/ https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4680-1
|
| kernel-headers | CVE-2019-19816 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19816 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19816 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19816 https://linux.oracle.com/cve/CVE-2019-19816.html https://linux.oracle.com/errata/ELSA-2020-5995.html https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html https://security.netapp.com/advisory/ntap-20200103-0001/ https://ubuntu.com/security/notices/USN-4414-1 https://ubuntu.com/security/notices/USN-4708-1 https://ubuntu.com/security/notices/USN-4709-1 https://usn.ubuntu.com/4414-1/
|
| kernel-headers | CVE-2019-19927 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-19927 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19927 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19927 https://github.com/torvalds/linux/commit/453393369dc9806d2455151e329c599684762428 https://github.com/torvalds/linux/commit/a66477b0efe511d98dde3e4aaeb189790e6f0a39 https://github.com/torvalds/linux/commit/ac1e516d5a4c56bf0cb4a3dfc0672f689131cfd4 https://security.netapp.com/advisory/ntap-20200204-0002/
|
| kernel-headers | CVE-2019-2054 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html https://access.redhat.com/security/cve/CVE-2019-2054 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2054 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0f3912fd934cdfd03d93f2dc6f064099795bf638 https://github.com/GrapheneOS/kernel_google_marlin/commit/bac2f2dde8af50c477b580743deb688db25e9e63 https://source.android.com/security/bulletin/2019-05-01 https://ubuntu.com/security/notices/USN-4076-1 https://ubuntu.com/security/notices/USN-4095-2 https://usn.ubuntu.com/4076-1/ https://usn.ubuntu.com/4095-2/
|
| kernel-headers | CVE-2019-20636 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-20636 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636 https://git.kernel.org/linus/cb222aed03d798fc074be55e59d9a112338ee784 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cb222aed03d798fc074be55e59d9a112338ee784 https://github.com/torvalds/linux/commit/cb222aed03d798fc074be55e59d9a112338ee784 https://linux.oracle.com/cve/CVE-2019-20636.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://security.netapp.com/advisory/ntap-20200430-0004/
|
| kernel-headers | CVE-2019-20794 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/08/24/1 https://access.redhat.com/security/cve/CVE-2019-20794 https://github.com/sargun/fuse-example https://nvd.nist.gov/vuln/detail/CVE-2019-20794 https://security.netapp.com/advisory/ntap-20200608-0001/ https://sourceforge.net/p/fuse/mailman/message/36598753/
|
| kernel-headers | CVE-2019-20812 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html https://access.redhat.com/security/cve/CVE-2019-20812 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812 https://git.kernel.org/linus/b43d1f9f7067c6759b1051e8ecb84e82cef569fe https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b43d1f9f7067c6759b1051e8ecb84e82cef569fe https://linux.oracle.com/cve/CVE-2019-20812.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-3874 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/security/cve/CVE-2019-3874 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3874 https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=1033990ac5b2ab6cee93734cb6d301aa3a35bcaa https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=9dde27de3e5efa0d032f3c891a0ca833a0d31911 https://linux.oracle.com/cve/CVE-2019-3874.html https://linux.oracle.com/errata/ELSA-2020-5885.html https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u https://lore.kernel.org/netdev/cover.1554022192.git.lucien.xin@gmail.com/ https://security.netapp.com/advisory/ntap-20190411-0003/ https://ubuntu.com/security/notices/USN-3979-1 https://ubuntu.com/security/notices/USN-3980-1 https://ubuntu.com/security/notices/USN-3980-2 https://ubuntu.com/security/notices/USN-3981-1 https://ubuntu.com/security/notices/USN-3981-2 https://ubuntu.com/security/notices/USN-3982-1 https://ubuntu.com/security/notices/USN-3982-2 https://usn.ubuntu.com/3979-1/ https://usn.ubuntu.com/3980-1/ https://usn.ubuntu.com/3980-2/ https://usn.ubuntu.com/3981-1/ https://usn.ubuntu.com/3981-2/ https://usn.ubuntu.com/3982-1/ https://usn.ubuntu.com/3982-2/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-3901 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://www.securityfocus.com/bid/89937 https://access.redhat.com/security/cve/CVE-2019-3901 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3901 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901 https://linux.oracle.com/cve/CVE-2019-3901.html https://linux.oracle.com/errata/ELSA-2021-9473.html https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html https://security.netapp.com/advisory/ntap-20190517-0005/
|
| kernel-headers | CVE-2019-5108 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html https://access.redhat.com/security/cve/CVE-2019-5108 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5108 https://git.kernel.org/linus/3e493173b7841259a08c5c8e5cbe90adb349da7e https://linux.oracle.com/cve/CVE-2019-5108.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://security.netapp.com/advisory/ntap-20200204-0002/ https://talosintelligence.com/vulnerability_reports/TALOS-2019-0900 https://ubuntu.com/security/notices/USN-4285-1 https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4285-1/ https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/ https://www.debian.org/security/2020/dsa-4698 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-9454 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-9454 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454 https://git.kernel.org/linus/89c6efa61f5709327ecfa24bff18e57a4e80c7fa https://linux.oracle.com/cve/CVE-2019-9454.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://source.android.com/security/bulletin/pixel/2019-09-01
|
| kernel-headers | CVE-2019-9458 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html https://access.redhat.com/security/cve/CVE-2019-9458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458 https://git.kernel.org/linus/ad608fbcf166fec809e402d548761768f602702c https://linux.oracle.com/cve/CVE-2019-9458.html https://linux.oracle.com/errata/ELSA-2021-9442.html https://source.android.com/security/bulletin/pixel/2019-09-01
|
| kernel-headers | CVE-2019-9503 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-9503 https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html#cve-2019-9503-remotely-sending-firmware-events-bypassing-is-wlc-event-frame https://bugzilla.redhat.com/show_bug.cgi?id=1701842 https://bugzilla.suse.com/show_bug.cgi?id=1132828 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f https://kb.cert.org/vuls/id/166939/ https://linux.oracle.com/cve/CVE-2019-9503.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9503.html https://security-tracker.debian.org/tracker/CVE-2019-9503 https://ubuntu.com/security/notices/USN-3979-1 https://ubuntu.com/security/notices/USN-3980-1 https://ubuntu.com/security/notices/USN-3980-2 https://ubuntu.com/security/notices/USN-3981-1 https://ubuntu.com/security/notices/USN-3981-2 https://ubuntu.com/security/notices/USN-4076-1 https://ubuntu.com/security/notices/USN-4095-1 https://www.bleepingcomputer.com/news/security/broadcom-wifi-driver-flaws-expose-computers-phones-iot-to-rce-attacks/
|
| kernel-headers | CVE-2020-0305 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html https://access.redhat.com/security/cve/CVE-2020-0305 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305 https://git.kernel.org/linus/68faa679b8be1a74e6663c21c3a9d25d32f1c079 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68faa679b8be1a74e6663c21c3a9d25d32f1c079 https://linux.oracle.com/cve/CVE-2020-0305.html https://linux.oracle.com/errata/ELSA-2021-9442.html https://source.android.com/security/bulletin/pixel/2020-06-01
|
| kernel-headers | CVE-2020-0404 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html https://access.redhat.com/security/cve/CVE-2020-0404 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0404 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/68035c80e129c4cfec659aac4180354530b26527 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527 https://linux.oracle.com/cve/CVE-2020-0404.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://source.android.com/security/bulletin/2020-09-01
|
| kernel-headers | CVE-2020-0431 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html https://access.redhat.com/security/cve/CVE-2020-0431 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0431 https://git.kernel.org/linus/4f3882177240a1f55e45a3d241d3121341bead78 https://linux.oracle.com/cve/CVE-2020-0431.html https://linux.oracle.com/errata/ELSA-2021-9086.html https://patchwork.kernel.org/project/linux-input/patch/20191207210518.GA181006@dtor-ws/ https://source.android.com/security/bulletin/pixel/2020-09-01
|
| kernel-headers | CVE-2020-0465 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-0465 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465 https://git.kernel.org/linus/35556bed836f8dc07ac55f69c8d17dce3e7f0e25 https://git.kernel.org/linus/bce1305c0ece3dc549663605e567655dd701752c https://linux.oracle.com/cve/CVE-2020-0465.html https://linux.oracle.com/errata/ELSA-2022-0620.html https://source.android.com/security/bulletin/2020-12-01 https://ubuntu.com/security/notices/USN-4912-1
|
| kernel-headers | CVE-2020-10135 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html http://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html http://seclists.org/fulldisclosure/2020/Jun/5 https://access.redhat.com/security/cve/CVE-2020-10135 https://bugzilla.suse.com/show_bug.cgi?id=1171988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135 https://francozappa.github.io/about-bias/ https://github.com/marcinguy/CVE-2020-10135-BIAS https://kb.cert.org/vuls/id/647177/ https://lkml.org/lkml/2020/10/15/98 https://lore.kernel.org/linux-bluetooth/20200520212015.626026-2-luiz.dentz@gmail.com/T/#m3d2012da00716dc280e9725484e8ff1d640d03b5 https://packetstormsecurity.com/files/157922/Bluetooth-Impersonation-Attack-BIAS-Proof-Of-Concept.html https://ubuntu.com/security/notices/USN-4657-1 https://ubuntu.com/security/notices/USN-4658-1 https://ubuntu.com/security/notices/USN-4659-1 https://ubuntu.com/security/notices/USN-4680-1 https://ubuntu.com/security/notices/USN-4752-1 https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/bias-vulnerability/
|
| kernel-headers | CVE-2020-10732 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html https://access.redhat.com/security/cve/CVE-2020-10732 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10732 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732 https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=aca969cacf07f41070d788ce2b8ca71f09d5207d https://github.com/google/kmsan/issues/76 https://github.com/ruscur/linux/commit/a95cdec9fa0c08e6eeb410d461c03af8fd1fef0a https://linux.oracle.com/cve/CVE-2020-10732.html https://linux.oracle.com/errata/ELSA-2020-5837.html https://lore.kernel.org/lkml/CAG48ez1u9=Uqcx2dH=7xea1R+WpnL239DSoVHLwV09=FxZUevQ@mail.gmail.com/#t https://lore.kernel.org/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg@mail.gmail.com/ https://security.netapp.com/advisory/ntap-20210129-0005/ https://twitter.com/grsecurity/status/1252558055629299712 https://ubuntu.com/security/notices/USN-4411-1 https://ubuntu.com/security/notices/USN-4427-1 https://ubuntu.com/security/notices/USN-4439-1 https://ubuntu.com/security/notices/USN-4440-1 https://ubuntu.com/security/notices/USN-4485-1 https://usn.ubuntu.com/4411-1/ https://usn.ubuntu.com/4427-1/ https://usn.ubuntu.com/4439-1/ https://usn.ubuntu.com/4440-1/ https://usn.ubuntu.com/4485-1/ https://www.openwall.com/lists/oss-security/2020/05/06/1
|
| kernel-headers | CVE-2020-10742 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-10742 https://bugzilla.redhat.com/show_bug.cgi?id=1835127 https://linux.oracle.com/cve/CVE-2020-10742.html https://linux.oracle.com/errata/ELSA-2020-4060.html
|
| kernel-headers | CVE-2020-10751 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html http://www.openwall.com/lists/oss-security/2020/05/27/3 https://access.redhat.com/security/cve/CVE-2020-10751 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751 https://git.kernel.org/linus/fb73974172ffaaf57a7c42f35424d9aece1a5af6 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6 https://linux.oracle.com/cve/CVE-2020-10751.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/ https://ubuntu.com/security/notices/USN-4389-1 https://ubuntu.com/security/notices/USN-4390-1 https://ubuntu.com/security/notices/USN-4391-1 https://ubuntu.com/security/notices/USN-4412-1 https://ubuntu.com/security/notices/USN-4413-1 https://usn.ubuntu.com/4389-1/ https://usn.ubuntu.com/4390-1/ https://usn.ubuntu.com/4391-1/ https://usn.ubuntu.com/4412-1/ https://usn.ubuntu.com/4413-1/ https://www.debian.org/security/2020/dsa-4698 https://www.debian.org/security/2020/dsa-4699 https://www.openwall.com/lists/oss-security/2020/04/30/5 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2020-11565 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-11565 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd https://git.kernel.org/linus/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd https://github.com/torvalds/linux/commit/aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd https://linux.oracle.com/cve/CVE-2020-11565.html https://linux.oracle.com/errata/ELSA-2020-4431.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-11565 https://ubuntu.com/security/notices/USN-4363-1 https://ubuntu.com/security/notices/USN-4364-1 https://ubuntu.com/security/notices/USN-4367-1 https://ubuntu.com/security/notices/USN-4368-1 https://ubuntu.com/security/notices/USN-4369-1 https://usn.ubuntu.com/4363-1/ https://usn.ubuntu.com/4364-1/ https://usn.ubuntu.com/4367-1/ https://usn.ubuntu.com/4368-1/ https://usn.ubuntu.com/4369-1/ https://www.debian.org/security/2020/dsa-4667 https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-12114 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://packetstormsecurity.com/files/159565/Kernel-Live-Patch-Security-Notice-LSN-0072-1.html http://www.openwall.com/lists/oss-security/2020/05/04/2 https://access.redhat.com/security/cve/CVE-2020-12114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12114 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4edbe133f851c9e3a2f2a1db367e826b01e72594 https://linux.oracle.com/cve/CVE-2020-12114.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4387-1 https://ubuntu.com/security/notices/USN-4388-1 https://ubuntu.com/security/notices/USN-4389-1 https://ubuntu.com/security/notices/USN-4390-1 https://ubuntu.com/security/notices/USN-4391-1 https://ubuntu.com/security/notices/USN-4392-1 https://usn.ubuntu.com/4387-1/ https://usn.ubuntu.com/4388-1/ https://usn.ubuntu.com/4389-1/ https://usn.ubuntu.com/4390-1/ https://usn.ubuntu.com/4391-1/ https://usn.ubuntu.com/4392-1/ https://www.debian.org/security/2020/dsa-4698 https://www.debian.org/security/2020/dsa-4699 https://www.openwall.com/lists/oss-security/2020/05/04/2 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2020-12363 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-12363 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363 https://linux.oracle.com/cve/CVE-2020-12363.html https://linux.oracle.com/errata/ELSA-2021-2314.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
| kernel-headers | CVE-2020-12364 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-12364 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364 https://linux.oracle.com/cve/CVE-2020-12364.html https://linux.oracle.com/errata/ELSA-2021-2314.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html
|
| kernel-headers | CVE-2020-12464 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html https://access.redhat.com/security/cve/CVE-2020-12464 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=056ad39ee9253873522f6469c3364964a322912b https://git.kernel.org/linus/056ad39ee9253873522f6469c3364964a322912b (5.7-rc3) https://github.com/torvalds/linux/commit/056ad39ee9253873522f6469c3364964a322912b https://linux.oracle.com/cve/CVE-2020-12464.html https://linux.oracle.com/errata/ELSA-2021-9002.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lkml.org/lkml/2020/3/23/52 https://nvd.nist.gov/vuln/detail/CVE-2020-12464 https://patchwork.kernel.org/patch/11463781/ https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4387-1 https://ubuntu.com/security/notices/USN-4388-1 https://ubuntu.com/security/notices/USN-4389-1 https://ubuntu.com/security/notices/USN-4390-1 https://ubuntu.com/security/notices/USN-4391-1 https://usn.ubuntu.com/4387-1/ https://usn.ubuntu.com/4388-1/ https://usn.ubuntu.com/4389-1/ https://usn.ubuntu.com/4390-1/ https://usn.ubuntu.com/4391-1/ https://www.debian.org/security/2020/dsa-4698 https://www.debian.org/security/2020/dsa-4699
|
| kernel-headers | CVE-2020-12770 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-12770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770 https://git.kernel.org/linus/83c6f2390040f188cc25b270b4befeb5628c1aee (5.7-rc3) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee https://linux.oracle.com/cve/CVE-2020-12770.html https://linux.oracle.com/errata/ELSA-2020-5756.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R54VC7B6MDYKP57AWC2HN7AUJYH62RKI/ https://lkml.org/lkml/2020/4/13/870 https://nvd.nist.gov/vuln/detail/CVE-2020-12770 https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4411-1 https://ubuntu.com/security/notices/USN-4412-1 https://ubuntu.com/security/notices/USN-4413-1 https://ubuntu.com/security/notices/USN-4414-1 https://ubuntu.com/security/notices/USN-4419-1 https://usn.ubuntu.com/4411-1/ https://usn.ubuntu.com/4412-1/ https://usn.ubuntu.com/4413-1/ https://usn.ubuntu.com/4414-1/ https://usn.ubuntu.com/4419-1/ https://www.debian.org/security/2020/dsa-4698 https://www.debian.org/security/2020/dsa-4699
|
| kernel-headers | CVE-2020-12826 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-12826 https://bugzilla.redhat.com/show_bug.cgi?id=1822077 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826 https://git.kernel.org/linus/d1e7fd6462ca9fc76650fbe6ca800e35b24267da https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da https://github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef https://linux.oracle.com/cve/CVE-2020-12826.html https://linux.oracle.com/errata/ELSA-2020-4431.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lists.openwall.net/linux-kernel/2020/03/24/1803 https://nvd.nist.gov/vuln/detail/CVE-2020-12826 https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4367-1 https://ubuntu.com/security/notices/USN-4369-1 https://ubuntu.com/security/notices/USN-4391-1 https://usn.ubuntu.com/4367-1/ https://usn.ubuntu.com/4369-1/ https://usn.ubuntu.com/4391-1/ https://www.openwall.com/lists/kernel-hardening/2020/03/25/1
|
| kernel-headers | CVE-2020-13974 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html https://access.redhat.com/security/cve/CVE-2020-13974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/b86dab054059b970111b5516ae548efaae5b3aae https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad0bf9ce93fa40b667eccd3306783f4db4b932b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae https://linux.oracle.com/cve/CVE-2020-13974.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html https://lkml.org/lkml/2020/3/22/482 https://lore.kernel.org/lkml/CAEAjams79+V8bxpcp3UAsU1AnJ+gx2y+ZqhDhjJCpZn2oeZA4Q@mail.gmail.com/ https://nvd.nist.gov/vuln/detail/CVE-2020-13974 https://ubuntu.com/security/notices/USN-4427-1 https://ubuntu.com/security/notices/USN-4439-1 https://ubuntu.com/security/notices/USN-4440-1 https://ubuntu.com/security/notices/USN-4483-1 https://ubuntu.com/security/notices/USN-4485-1 https://usn.ubuntu.com/4427-1/ https://usn.ubuntu.com/4439-1/ https://usn.ubuntu.com/4440-1/ https://usn.ubuntu.com/4483-1/ https://usn.ubuntu.com/4485-1/
|
| kernel-headers | CVE-2020-14305 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-14305 https://bugs.openvz.org/browse/OVZ-7188 https://bugzilla.redhat.com/show_bug.cgi?id=1850716 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v4.9.232&id=396ba2fc4f27ef6c44bbc0098bfddf4da76dc4c9 https://linux.oracle.com/cve/CVE-2020-14305.html https://linux.oracle.com/errata/ELSA-2021-9002.html https://patchwork.ozlabs.org/project/netfilter-devel/patch/c2385b5c-309c-cc64-2e10-a0ef62897502@virtuozzo.com/ https://security.netapp.com/advisory/ntap-20201210-0004/
|
| kernel-headers | CVE-2020-14381 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-14381 https://bugzilla.redhat.com/show_bug.cgi?id=1874311 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14381 https://git.kernel.org/linus/8019ad13ef7f64be44d4f892af9c840179009254 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8019ad13ef7f64be44d4f892af9c840179009254 https://linux.oracle.com/cve/CVE-2020-14381.html https://linux.oracle.com/errata/ELSA-2021-9007.html https://nvd.nist.gov/vuln/detail/CVE-2020-14381
|
| kernel-headers | CVE-2020-14416 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html https://access.redhat.com/security/cve/CVE-2020-14416 https://bugzilla.suse.com/show_bug.cgi?id=1162002 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.16 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ace17d56824165c7f4c68785d6b58971db954dd https://linux.oracle.com/cve/CVE-2020-14416.html https://linux.oracle.com/errata/ELSA-2020-5801.html
|
| kernel-headers | CVE-2020-16166 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html https://access.redhat.com/security/cve/CVE-2020-16166 https://arxiv.org/pdf/2012.07432.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16166 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f227e3ec3b5cad859ad15666874405e8c1bbc1d4 https://git.kernel.org/linus/f227e3ec3b5cad859ad15666874405e8c1bbc1d4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c51f8f88d705e06bd696d7510aff22b33eb8e638 https://github.com/torvalds/linux/commit/f227e3ec3b5cad859ad15666874405e8c1bbc1d4 https://linux.oracle.com/cve/CVE-2020-16166.html https://linux.oracle.com/errata/ELSA-2020-5962.html https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAPTLPAEKVAJYJ4LHN7VH4CN2W75R2YW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFBCLQWJI5I4G25TVJNLXLAXJ4MERQNW/ https://nvd.nist.gov/vuln/detail/CVE-2020-16166 https://security.netapp.com/advisory/ntap-20200814-0004/ https://ubuntu.com/security/notices/USN-4525-1 https://ubuntu.com/security/notices/USN-4526-1 https://usn.ubuntu.com/4525-1/ https://usn.ubuntu.com/4526-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2020-1749 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-1749 https://bugzilla.redhat.com/show_bug.cgi?id=1809833 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=6c8991f41546 https://linux.oracle.com/cve/CVE-2020-1749.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://security.netapp.com/advisory/ntap-20201222-0001/ https://ubuntu.com/security/notices/USN-4388-1 https://ubuntu.com/security/notices/USN-4390-1 https://ubuntu.com/security/notices/USN-4391-1
|
| kernel-headers | CVE-2020-24502 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-24502 https://linux.oracle.com/cve/CVE-2020-24502.html https://linux.oracle.com/cve/CVE-2020-245024.html https://linux.oracle.com/errata/ELSA-2022-9368.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
| kernel-headers | CVE-2020-24503 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-24503 https://linux.oracle.com/cve/CVE-2020-24503.html https://linux.oracle.com/errata/ELSA-2022-9368.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
| kernel-headers | CVE-2020-24504 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-24504 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24504 https://linux.oracle.com/cve/CVE-2020-24504.html https://linux.oracle.com/errata/ELSA-2021-4356.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html
|
| kernel-headers | CVE-2020-24586 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-24586 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24586 https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-24586.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/ https://papers.mathyvanhoef.com/usenix2021.pdf https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5018-1 https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
|
| kernel-headers | CVE-2020-24587 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-24587 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24587 https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-24587.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/ https://papers.mathyvanhoef.com/usenix2021.pdf https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5018-1 https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
|
| kernel-headers | CVE-2020-24588 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-24588 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24588 https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-24588.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/ https://papers.mathyvanhoef.com/usenix2021.pdf https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html
|
| kernel-headers | CVE-2020-25284 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html https://access.redhat.com/security/cve/CVE-2020-25284 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25284 https://git.kernel.org/linus/f44d04e696feaf13d192d942c4f14ad2e117065a https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f44d04e696feaf13d192d942c4f14ad2e117065a https://linux.oracle.com/cve/CVE-2020-25284.html https://linux.oracle.com/errata/ELSA-2021-1578.html https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://nvd.nist.gov/vuln/detail/CVE-2020-25284 https://twitter.com/grsecurity/status/1304537507560919041 https://ubuntu.com/security/notices/USN-4657-1 https://ubuntu.com/security/notices/USN-4658-1 https://ubuntu.com/security/notices/USN-4660-1 https://ubuntu.com/security/notices/USN-4752-1
|
| kernel-headers | CVE-2020-25285 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-25285 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25285 https://git.kernel.org/linus/17743798d81238ab13050e8e2833699b54e15467 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17743798d81238ab13050e8e2833699b54e15467 https://linux.oracle.com/cve/CVE-2020-25285.html https://linux.oracle.com/errata/ELSA-2021-1578.html https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://nvd.nist.gov/vuln/detail/CVE-2020-25285 https://security.netapp.com/advisory/ntap-20201009-0002/ https://twitter.com/grsecurity/status/1303749848898904067 https://ubuntu.com/security/notices/USN-4576-1 https://ubuntu.com/security/notices/USN-4579-1 https://ubuntu.com/security/notices/USN-4660-1 https://ubuntu.com/security/notices/USN-4912-1 https://usn.ubuntu.com/4576-1/ https://usn.ubuntu.com/4579-1/
|
| kernel-headers | CVE-2020-26139 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-26139 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26139 https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-26139.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/ https://papers.mathyvanhoef.com/usenix2021.pdf https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5018-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com
|
| kernel-headers | CVE-2020-26140 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-26140 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-26140.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com
|
| kernel-headers | CVE-2020-26141 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-26141 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26141 https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-26141.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/ https://papers.mathyvanhoef.com/usenix2021.pdf https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5361-1 https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com
|
| kernel-headers | CVE-2020-26143 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-26143 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-26143.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com
|
| kernel-headers | CVE-2020-26144 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-26144 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-26144.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com
|
| kernel-headers | CVE-2020-26555 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-26555 https://bugzilla.redhat.com/show_bug.cgi?id=1918601 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555 https://kb.cert.org/vuls/id/799380 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NSS6CTGE4UGTJLCOZOASDR3T3SLL6QJZ/ https://ubuntu.com/security/notices/USN-5343-1 https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/impersonation-pin-pairing/ https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/reporting-security/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00520.html
|
| kernel-headers | CVE-2020-27067 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27067 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27067 https://salsa.debian.org/kernel-team/kernel-sec/-/blob/master/retired/CVE-2020-27067 https://source.android.com/security/bulletin/pixel/2020-12-01
|
| kernel-headers | CVE-2020-27170 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 | Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html http://www.openwall.com/lists/oss-security/2021/03/24/4 https://access.redhat.com/security/cve/CVE-2020-27170 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76 https://linux.oracle.com/cve/CVE-2020-27170.html https://linux.oracle.com/errata/ELSA-2021-9223.html https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/ https://nvd.nist.gov/vuln/detail/CVE-2020-27170 https://ubuntu.com/security/notices/USN-4887-1 https://ubuntu.com/security/notices/USN-4890-1 https://www.openwall.com/lists/oss-security/2021/03/19/2
|
| kernel-headers | CVE-2020-27171 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html http://www.openwall.com/lists/oss-security/2021/03/24/5 https://access.redhat.com/security/cve/CVE-2020-27171 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27171 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899 https://linux.oracle.com/cve/CVE-2020-27171.html https://linux.oracle.com/errata/ELSA-2021-9223.html https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/ https://nvd.nist.gov/vuln/detail/CVE-2020-27171 https://ubuntu.com/security/notices/USN-4887-1 https://ubuntu.com/security/notices/USN-4890-1 https://www.openwall.com/lists/oss-security/2021/03/19/3
|
| kernel-headers | CVE-2020-2732 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2020-2732 https://bugzilla.redhat.com/show_bug.cgi?id=1805135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732 https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d https://linux.oracle.com/cve/CVE-2020-2732.html https://linux.oracle.com/errata/ELSA-2020-5540.html https://linux.oracle.com/errata/ELSA-2020-5542.html https://linux.oracle.com/errata/ELSA-2020-5543.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://ubuntu.com/security/notices/USN-4300-1 https://ubuntu.com/security/notices/USN-4301-1 https://ubuntu.com/security/notices/USN-4302-1 https://ubuntu.com/security/notices/USN-4303-1 https://ubuntu.com/security/notices/USN-4303-2 https://www.debian.org/security/2020/dsa-4667 https://www.debian.org/security/2020/dsa-4698 https://www.openwall.com/lists/oss-security/2020/02/25/3 https://www.openwall.com/lists/oss-security/2020/02/25/4 https://www.spinics.net/lists/kvm/msg208259.html
|
| kernel-headers | CVE-2020-27786 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/12/03/1 https://access.redhat.com/security/cve/CVE-2020-27786 https://bugzilla.redhat.com/show_bug.cgi?id=1900933 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27786 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1f6e3c818dd734c30f6a7eeebf232ba2cf3181d https://linux.oracle.com/cve/CVE-2020-27786.html https://linux.oracle.com/errata/ELSA-2021-9030.html https://security.netapp.com/advisory/ntap-20210122-0002/ https://www.openwall.com/lists/oss-security/2020/12/01/1
|
| kernel-headers | CVE-2020-27835 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27835 https://bugzilla.redhat.com/show_bug.cgi?id=1901709 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27835 https://git.kernel.org/linus/3d2a9d642512c21a12d19b9250e7a835dcb41a79 https://linux.oracle.com/cve/CVE-2020-27835.html https://linux.oracle.com/errata/ELSA-2021-1578.html https://ubuntu.com/security/notices/USN-4751-1
|
| kernel-headers | CVE-2020-28097 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28097 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28097 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=973c096f6a85e5b5f2a295126ba6928d9a6afd45 https://github.com/torvalds/linux/commit/973c096f6a85e5b5f2a295126ba6928d9a6afd45 https://linux.oracle.com/cve/CVE-2020-28097.html https://linux.oracle.com/errata/ELSA-2021-9442.html https://seclists.org/oss-sec/2020/q3/176 https://security.netapp.com/advisory/ntap-20210805-0001/ https://www.openwall.com/lists/oss-security/2020/09/16/1
|
| kernel-headers | CVE-2020-28915 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28915 https://bugzilla.suse.com/show_bug.cgi?id=1178886 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28915 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16 https://linux.oracle.com/cve/CVE-2020-28915.html https://linux.oracle.com/errata/ELSA-2021-9043.html https://nvd.nist.gov/vuln/detail/CVE-2020-28915 https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd https://ubuntu.com/security/notices/USN-4657-1 https://ubuntu.com/security/notices/USN-4658-1 https://ubuntu.com/security/notices/USN-4659-1 https://ubuntu.com/security/notices/USN-4660-1 https://ubuntu.com/security/notices/USN-4752-1
|
| kernel-headers | CVE-2020-28974 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/11/25/1 https://access.redhat.com/security/cve/CVE-2020-28974 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28974 https://git.kernel.org/linus/3c4e0dff2095c579b142d5a0693257f1c58b4804 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804 https://linux.oracle.com/cve/CVE-2020-28974.html https://linux.oracle.com/errata/ELSA-2021-9043.html https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html https://nvd.nist.gov/vuln/detail/CVE-2020-28974 https://seclists.org/oss-sec/2020/q4/104 https://security.netapp.com/advisory/ntap-20210108-0003/ https://ubuntu.com/security/notices/USN-4679-1 https://ubuntu.com/security/notices/USN-4680-1 https://ubuntu.com/security/notices/USN-4681-1 https://ubuntu.com/security/notices/USN-4683-1 https://ubuntu.com/security/notices/USN-4751-1 https://www.openwall.com/lists/oss-security/2020/11/09/2
|
| kernel-headers | CVE-2020-29374 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html https://access.redhat.com/security/cve/CVE-2020-29374 https://bugs.chromium.org/p/project-zero/issues/detail?id=2045 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29374 https://git.kernel.org/linus/17839856fd588f4ab6b789f482ed3ffd7c403e1f https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=17839856fd588f4ab6b789f482ed3ffd7c403e1f https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2020-29374 https://security.netapp.com/advisory/ntap-20210115-0002/ https://ubuntu.com/security/notices/USN-4748-1 https://ubuntu.com/security/notices/USN-4749-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2020-36158 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-36158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36158 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c455c5ab332773464d02ba17015acdca198f03d https://git.kernel.org/linus/5c455c5ab332773464d02ba17015acdca198f03d (5.11-rc1) https://github.com/torvalds/linux/commit/5c455c5ab332773464d02ba17015acdca198f03d https://linux.oracle.com/cve/CVE-2020-36158.html https://linux.oracle.com/errata/ELSA-2021-9043.html https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCHBIRS27VMOGMBHPWP2R7SZRFXT6O6U/ https://lore.kernel.org/r/20201206084801.26479-1-ruc_zhangxiaohui@163.com https://nvd.nist.gov/vuln/detail/CVE-2020-36158 https://patchwork.kernel.org/project/linux-wireless/patch/20201206084801.26479-1-ruc_zhangxiaohui@163.com/ https://security.netapp.com/advisory/ntap-20210212-0002/ https://ubuntu.com/security/notices/USN-4876-1 https://ubuntu.com/security/notices/USN-4877-1 https://ubuntu.com/security/notices/USN-4878-1 https://ubuntu.com/security/notices/USN-4879-1 https://ubuntu.com/security/notices/USN-4912-1 https://www.debian.org/security/2021/dsa-4843
|
| kernel-headers | CVE-2020-36386 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-36386 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36386 https://git.kernel.org/linus/51c19bf3d5cfaa66571e4b88ba2a6f6295311101 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101 https://linux.oracle.com/cve/CVE-2020-36386.html https://linux.oracle.com/errata/ELSA-2021-9346.html https://sites.google.com/view/syzscope/kasan-slab-out-of-bounds-read-in-hci_extended_inquiry_result_evt https://syzkaller.appspot.com/bug?id=4bf11aa05c4ca51ce0df86e500fce486552dc8d2 https://syzkaller.appspot.com/text?tag=ReproC&x=15ca2f46900000
|
| kernel-headers | CVE-2020-36516 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-36516 https://dl.acm.org/doi/10.1145/3372297.3417884 https://linux.oracle.com/cve/CVE-2020-36516.html https://linux.oracle.com/errata/ELSA-2022-9314.html https://security.netapp.com/advisory/ntap-20220331-0003/ https://www.spinics.net/lists/netdev/msg795642.html
|
| kernel-headers | CVE-2020-3702 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-3702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3702 https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lore.kernel.org/linux-wireless/CABvG-CVvPF++0vuGzCrBj8+s=Bcx1GwWfiW1_Somu_GVncTAcQ@mail.gmail.com/ https://lore.kernel.org/stable/20210818084859.vcs4vs3yd6zetmyt@pali/t/#mf8b430d4f19f1b939a29b6c5098fdc514fd1a928 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5114-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2 https://ubuntu.com/security/notices/USN-5361-1 https://www.arista.com/en/support/advisories-notices/security-advisories/11998-security-advisory-58 https://www.debian.org/security/2021/dsa-4978 https://www.qualcomm.com/company/product-security/bulletins/august-2020-bulletin
|
| kernel-headers | CVE-2020-4788 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/11/20/3 http://www.openwall.com/lists/oss-security/2020/11/23/1 https://access.redhat.com/security/cve/CVE-2020-4788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-4788 https://errata.almalinux.org/8/ALSA-2022-1988.html https://exchange.xforce.ibmcloud.com/vulnerabilities/189296 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dda3f4252e6c8b833a2ef164afd3da9808d0f07c https://linux.oracle.com/cve/CVE-2020-4788.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TITJQPYDWZ4NB2ONJWUXW75KSQIPF35T/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZF4OGZPKTAJJXWHPIFP3LHEWWEMR5LPT/ https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc https://ubuntu.com/security/notices/USN-4657-1 https://ubuntu.com/security/notices/USN-4658-1 https://ubuntu.com/security/notices/USN-4659-1 https://ubuntu.com/security/notices/USN-4660-1 https://ubuntu.com/security/notices/USN-4681-1 https://www.ibm.com/support/pages/node/6370729 https://www.openwall.com/lists/oss-security/2020/11/20/3
|
| kernel-headers | CVE-2020-8647 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html https://access.redhat.com/security/cve/CVE-2020-8647 https://bugzilla.kernel.org/show_bug.cgi?id=206359 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647 https://linux.oracle.com/cve/CVE-2020-8647.html https://linux.oracle.com/errata/ELSA-2020-5691.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-8647 https://usn.ubuntu.com/lsn/0066-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-8648 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.31.1.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2020-8648 https://bugzilla.kernel.org/show_bug.cgi?id=206361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648 https://linux.oracle.com/cve/CVE-2020-8648.html https://linux.oracle.com/errata/ELSA-2021-2314.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-8648 https://security.netapp.com/advisory/ntap-20200924-0004/ https://ubuntu.com/security/notices/USN-4342-1 https://ubuntu.com/security/notices/USN-4344-1 https://ubuntu.com/security/notices/USN-4345-1 https://ubuntu.com/security/notices/USN-4346-1 https://usn.ubuntu.com/4342-1/ https://usn.ubuntu.com/4344-1/ https://usn.ubuntu.com/4345-1/ https://usn.ubuntu.com/4346-1/ https://usn.ubuntu.com/lsn/0066-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-8649 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html https://access.redhat.com/security/cve/CVE-2020-8649 https://bugzilla.kernel.org/show_bug.cgi?id=206357 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649 https://linux.oracle.com/cve/CVE-2020-8649.html https://linux.oracle.com/errata/ELSA-2020-5691.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-8649 https://usn.ubuntu.com/lsn/0066-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-8694 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8694 https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8694 https://linux.oracle.com/cve/CVE-2020-8694.html https://linux.oracle.com/errata/ELSA-2020-5996.html https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html https://lists.debian.org/debian-lts-announce/2020/12/msg00027.html https://platypusattack.com/ https://ubuntu.com/security/notices/USN-4626-1 https://ubuntu.com/security/notices/USN-4627-1 https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/Platypus https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
|
| kernel-headers | CVE-2020-8832 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8832 https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1862840 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8832 https://security.netapp.com/advisory/ntap-20200430-0004/ https://ubuntu.com/security/notices/USN-4302-1 https://usn.ubuntu.com/usn/usn-4302-1
|
| kernel-headers | CVE-2020-9383 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00039.html https://access.redhat.com/security/cve/CVE-2020-9383 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383 https://git.kernel.org/linus/2e90ca68b0d2f5548804f22f0dd61145516171e3 https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2f9ac30a54dc0181ddac3705cdcf4775d863c530 https://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3 https://linux.oracle.com/cve/CVE-2020-9383.html https://linux.oracle.com/errata/ELSA-2020-5676.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-9383 https://security.netapp.com/advisory/ntap-20200313-0003/ https://ubuntu.com/security/notices/USN-4342-1 https://ubuntu.com/security/notices/USN-4344-1 https://ubuntu.com/security/notices/USN-4345-1 https://ubuntu.com/security/notices/USN-4346-1 https://usn.ubuntu.com/4342-1/ https://usn.ubuntu.com/4344-1/ https://usn.ubuntu.com/4345-1/ https://usn.ubuntu.com/4346-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2021-0129 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json https://access.redhat.com/security/cve/CVE-2021-0129 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0129 https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=00da0fb4972cf59e1c075f313da81ea549cb8738 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d19628f539fccf899298ff02ee4c73e4bf6df3f https://linux.oracle.com/cve/CVE-2021-0129.html https://linux.oracle.com/errata/ELSA-2022-9088.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lists.debian.org/debian-lts-announce/2021/06/msg00022.html https://security.netapp.com/advisory/ntap-20210716-0002/ https://ubuntu.com/security/notices/USN-5017-1 https://ubuntu.com/security/notices/USN-5018-1 https://ubuntu.com/security/notices/USN-5046-1 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4951 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00517.html
|
| kernel-headers | CVE-2021-0512 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36385.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0512.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3656.json https://access.redhat.com/security/cve/CVE-2021-0512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0512 https://git.kernel.org/linus/ed9be64eefe26d7d8b0b5b9fa3ffdf425d87a01f https://linux.oracle.com/cve/CVE-2021-0512.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lore.kernel.org/lkml/20210301161013.666159680@linuxfoundation.org/ https://source.android.com/security/bulletin/2021-06-01
|
| kernel-headers | CVE-2021-20219 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20219 https://bugzilla.redhat.com/show_bug.cgi?id=1923738 https://linux.oracle.com/cve/CVE-2021-20219.html https://linux.oracle.com/errata/ELSA-2021-9215.html
|
| kernel-headers | CVE-2021-20261 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20261 https://bugzilla.redhat.com/show_bug.cgi?id=1932150 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20261 https://git.kernel.org/linus/a0c80efe5956ccce9fe7ae5c78542578c07bc20a https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0c80efe5956ccce9fe7ae5c78542578c07bc20a https://linux.oracle.com/cve/CVE-2021-20261.html https://linux.oracle.com/errata/ELSA-2021-9215.html https://ubuntu.com/security/notices/USN-4904-1
|
| kernel-headers | CVE-2021-20317 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20317.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43267.json https://access.redhat.com/security/cve/CVE-2021-20317 https://bugzilla.redhat.com/show_bug.cgi?id=2005258 https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20317 https://git.kernel.org/linus/511885d7061eda3eb1faf3f57dcc936ff75863f1 (5.4-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=511885d7061eda3eb1faf3f57dcc936ff75863f1 https://linux.oracle.com/cve/CVE-2021-20317.html https://linux.oracle.com/errata/ELSA-2022-9314.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-20320 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20320 https://bugzilla.redhat.com/show_bug.cgi?id=2010090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20320 https://lore.kernel.org/bpf/20210902185229.1840281-1-johan.almbladh@anyfinetworks.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-20320
|
| kernel-headers | CVE-2021-20321 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20321 https://bugzilla.redhat.com/show_bug.cgi?id=2013242 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20321 https://git.kernel.org/linus/a295aef603e109a47af355477326bd41151765b6 (5.15-rc5) https://linux.oracle.com/cve/CVE-2021-20321.html https://linux.oracle.com/errata/ELSA-2022-9088.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/all/20211011134508.748956131@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-20321 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-20322 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20322 https://bugzilla.redhat.com/show_bug.cgi?id=2014230 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20322 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43 https://linux.oracle.com/cve/CVE-2021-20322.html https://linux.oracle.com/errata/ELSA-2022-9260.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-20322 https://security.netapp.com/advisory/ntap-20220303-0002/ https://ubuntu.com/security/notices/USN-5268-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-23133 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/10/1 http://www.openwall.com/lists/oss-security/2021/05/10/2 http://www.openwall.com/lists/oss-security/2021/05/10/3 http://www.openwall.com/lists/oss-security/2021/05/10/4 https://access.redhat.com/security/cve/CVE-2021-23133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23133 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b https://linux.oracle.com/cve/CVE-2021-23133.html https://linux.oracle.com/errata/ELSA-2021-9363.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/ https://nvd.nist.gov/vuln/detail/CVE-2021-23133 https://security.netapp.com/advisory/ntap-20210611-0008/ https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5003-1 https://www.openwall.com/lists/oss-security/2021/04/18/2
|
| kernel-headers | CVE-2021-28711 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-28711 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28711 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5368-1 https://ubuntu.com/security/notices/USN-5377-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-391.html https://xenbits.xenproject.org/xsa/advisory-391.txt
|
| kernel-headers | CVE-2021-28712 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-28712 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28712 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5368-1 https://ubuntu.com/security/notices/USN-5377-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-391.html https://xenbits.xenproject.org/xsa/advisory-391.txt
|
| kernel-headers | CVE-2021-28713 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-28713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28713 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5298-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5368-1 https://ubuntu.com/security/notices/USN-5377-1 https://www.debian.org/security/2022/dsa-5050 https://www.debian.org/security/2022/dsa-5096 https://xenbits.xen.org/xsa/advisory-391.html https://xenbits.xenproject.org/xsa/advisory-391.txt
|
| kernel-headers | CVE-2021-28964 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-28964 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28964 https://git.kernel.org/linus/dbcc7d57bffc0c8cac9dac11bec548597d59a6a5 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbcc7d57bffc0c8cac9dac11bec548597d59a6a5 https://linux.oracle.com/cve/CVE-2021-28964.html https://linux.oracle.com/errata/ELSA-2021-9223.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/ https://nvd.nist.gov/vuln/detail/CVE-2021-28964 https://security.netapp.com/advisory/ntap-20210430-0003/ https://ubuntu.com/security/notices/USN-4948-1 https://ubuntu.com/security/notices/USN-4979-1 https://ubuntu.com/security/notices/USN-4982-1 https://ubuntu.com/security/notices/USN-4984-1 https://ubuntu.com/security/notices/USN-5361-1
|
| kernel-headers | CVE-2021-28972 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-28972 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28972 https://git.kernel.org/linus/cc7a0bb058b85ea03db87169c60c7cfdd5d34678 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc7a0bb058b85ea03db87169c60c7cfdd5d34678 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCKIOXCOZGXBEZMO5LGGV5MWCHO6FT3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTRNPQTZ4GVS46SZ4OBXY5YDOGVPSTGQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/ https://nvd.nist.gov/vuln/detail/CVE-2021-28972 https://security.netapp.com/advisory/ntap-20210430-0003/ https://ubuntu.com/security/notices/USN-4948-1 https://ubuntu.com/security/notices/USN-4979-1 https://ubuntu.com/security/notices/USN-4982-1 https://ubuntu.com/security/notices/USN-4984-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1
|
| kernel-headers | CVE-2021-29155 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-29155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29155 https://linux.oracle.com/cve/CVE-2021-29155.html https://linux.oracle.com/errata/ELSA-2021-9363.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/ https://nvd.nist.gov/vuln/detail/CVE-2021-29155 https://ubuntu.com/security/notices/USN-4977-1 https://ubuntu.com/security/notices/USN-4983-1 https://ubuntu.com/security/notices/USN-4999-1 https://www.kernel.org https://www.openwall.com/lists/oss-security/2021/04/18/4
|
| kernel-headers | CVE-2021-30002 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-30002 https://bugzilla.suse.com/show_bug.cgi?id=1184120 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30002 https://git.kernel.org/linus/fb18802a338b36f675a388fc03d2aa504a0d0899 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb18802a338b36f675a388fc03d2aa504a0d0899 https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://nvd.nist.gov/vuln/detail/CVE-2021-30002 https://ubuntu.com/security/notices/USN-4945-1 https://ubuntu.com/security/notices/USN-4945-2 https://ubuntu.com/security/notices/USN-4946-1 https://ubuntu.com/security/notices/USN-4947-1 https://ubuntu.com/security/notices/USN-4984-1
|
| kernel-headers | CVE-2021-3178 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3178 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3178 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51b2ee7d006a736a9126e8111d1f24e4fd0afaa6 https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/ https://nvd.nist.gov/vuln/detail/CVE-2021-3178 https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652@fieldses.org/ https://ubuntu.com/security/notices/USN-4876-1 https://ubuntu.com/security/notices/USN-4877-1 https://ubuntu.com/security/notices/USN-4878-1 https://ubuntu.com/security/notices/USN-4910-1 https://ubuntu.com/security/notices/USN-4912-1
|
| kernel-headers | CVE-2021-31829 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/04/4 https://access.redhat.com/security/cve/CVE-2021-31829 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31829 https://github.com/torvalds/linux/commit/801c6058d14a82179a7ee17a4b532cac6fad067f https://linux.oracle.com/cve/CVE-2021-31829.html https://linux.oracle.com/errata/ELSA-2021-9363.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWCZ6LJLENL2C3URW5ICARTACXPFCFN2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4X2G5YAPYJGI3PFEZZNOTRYI33GOCCZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZI7OBCJQDNWMKLBP6MZ5NV4EUTDAMX6Q/ https://nvd.nist.gov/vuln/detail/CVE-2021-31829 https://ubuntu.com/security/notices/USN-4983-1 https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5018-1 https://www.openwall.com/lists/oss-security/2021/05/04/4
|
| kernel-headers | CVE-2021-33098 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33098 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33098 https://security.netapp.com/advisory/ntap-20211210-0005/ https://ubuntu.com/security/notices/USN-5343-1 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00555.html
|
| kernel-headers | CVE-2021-33150 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33150 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00609.html
|
| kernel-headers | CVE-2021-33200 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33200 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e https://linux.oracle.com/cve/CVE-2021-33200.html https://linux.oracle.com/errata/ELSA-2021-4356.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LR3OKKPHIBGOMHN476CMLW2T7UG53QX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JJCABL43FT3FKRX5DBPZG25FNKR6CEK4/ https://nvd.nist.gov/vuln/detail/CVE-2021-33200 https://security.netapp.com/advisory/ntap-20210706-0004/ https://ubuntu.com/security/notices/USN-4983-1 https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5018-1 https://www.openwall.com/lists/oss-security/2021/05/27/1
|
| kernel-headers | CVE-2021-33624 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/06/21/1 https://access.redhat.com/security/cve/CVE-2021-33624 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33624 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=9183671af6dbf60a1219371d4ed73e23f43b49db https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=973377ffe8148180b2651825b92ae91988141b05 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=d203b0fd863a2261e5d00b97f3d060c4c2a6db71 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=fe9a5ca7e370e613a9a75a13008a3845ea759d6e https://github.com/torvalds/linux/commit/9183671af6dbf60a1219371d4ed73e23f43b49db https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://nvd.nist.gov/vuln/detail/CVE-2021-33624 https://ubuntu.com/security/notices/USN-5091-1 https://ubuntu.com/security/notices/USN-5091-2 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5115-1 https://www.openwall.com/lists/oss-security/2021/06/21/1 https://www.usenix.org/conference/usenixsecurity21/presentation/kirzner
|
| kernel-headers | CVE-2021-34556 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/08/01/3 https://access.redhat.com/security/cve/CVE-2021-34556 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34556 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/ https://nvd.nist.gov/vuln/detail/CVE-2021-34556 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/08/01/3
|
| kernel-headers | CVE-2021-34693 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/06/15/1 https://access.redhat.com/security/cve/CVE-2021-34693 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34693 https://linux.oracle.com/cve/CVE-2021-34693.html https://linux.oracle.com/errata/ELSA-2021-9453.html https://lists.debian.org/debian-lts-announce/2021/07/msg00014.html https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html https://lists.debian.org/debian-lts-announce/2021/07/msg00016.html https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076@3c-app-gmx-bs04/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-34693 https://ubuntu.com/security/notices/USN-5045-1 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5073-3 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4941 https://www.openwall.com/lists/oss-security/2021/06/15/1
|
| kernel-headers | CVE-2021-34866 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-34866 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34866 https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5b029a32cfe4600f5e10e36b41778506b90fd4de https://security.netapp.com/advisory/ntap-20220217-0008/ https://www.zerodayinitiative.com/advisories/ZDI-21-1148/
|
| kernel-headers | CVE-2021-34981 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-34981 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34981 https://git.kernel.org/linus/3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 (5.14-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfdf8fcaafa62a4123f92eb0f4a72650da3a479 https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
|
| kernel-headers | CVE-2021-35477 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35477 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35477 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=2039f26f3aca5b0e419b98f65dd36481337b86ee https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=f5e81d1117501546b7be050c5fbafa6efd2c722c https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/565ZS55ZFEN62WVRRORT7R63RXW5F4T4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JKK6XNRZX5BT5QVYOKGVJ2BHFZAP5EX/ https://nvd.nist.gov/vuln/detail/CVE-2021-35477 https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/08/01/3
|
| kernel-headers | CVE-2021-3564 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...http://www.openwall.com/lists/oss-security/2021/05/25/1 http://www.openwall.com/lists/oss-security/2021/06/01/2 https://access.redhat.com/security/cve/CVE-2021-3564 https://bugzilla.redhat.com/show_bug.cgi?id=1964139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564 https://linux.oracle.com/cve/CVE-2021-3564.html https://linux.oracle.com/errata/ELSA-2022-0620.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lore.kernel.org/linux-bluetooth/20210525123902.189012-1-gregkh@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-3564 https://ubuntu.com/security/notices/USN-5015-1 https://ubuntu.com/security/notices/USN-5044-1 https://ubuntu.com/security/notices/USN-5045-1 https://ubuntu.com/security/notices/USN-5046-1 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.openwall.com/lists/oss-security/2021/05/25/1
|
| kernel-headers | CVE-2021-3573 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json https://access.redhat.com/security/cve/CVE-2021-3573 https://bugzilla.redhat.com/show_bug.cgi?id=1966578 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573 https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52 https://linux.oracle.com/cve/CVE-2021-3573.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://nvd.nist.gov/vuln/detail/CVE-2021-3573 https://ubuntu.com/security/notices/USN-5015-1 https://ubuntu.com/security/notices/USN-5044-1 https://ubuntu.com/security/notices/USN-5045-1 https://ubuntu.com/security/notices/USN-5046-1 https://ubuntu.com/security/notices/USN-5050-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.openwall.com/lists/oss-security/2021/06/08/2
|
| kernel-headers | CVE-2021-3600 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json https://access.redhat.com/security/cve/CVE-2021-3600 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3600 https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90 https://linux.oracle.com/cve/CVE-2021-3600.html https://linux.oracle.com/errata/ELSA-2021-4356.html https://lore.kernel.org/patchwork/patch/1379497/ https://ubuntu.com/security/notices/USN-5003-1 https://www.openwall.com/lists/oss-security/2021/06/23/1
|
| kernel-headers | CVE-2021-3609 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22543.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22555.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3609.json https://access.redhat.com/security/cve/CVE-2021-3609 https://bugzilla.redhat.com/show_bug.cgi?id=1971651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3609 https://github.com/nrb547/kernel-exploitation/blob/main/cve-2021-3609/cve-2021-3609.md https://github.com/torvalds/linux/commit/d5f9023fa61ee8b94f37a93f08e94b136cf1e463 https://linux.oracle.com/cve/CVE-2021-3609.html https://linux.oracle.com/errata/ELSA-2021-9453.html https://lore.kernel.org/netdev/20210618071532.kr7o2rnx6ia4t6n6@pengutronix.de/T/#t https://lore.kernel.org/netdev/20210619161813.2098382-1-cascardo@canonical.com/T/#u https://nvd.nist.gov/vuln/detail/CVE-2021-3609 https://security.netapp.com/advisory/ntap-20220419-0004/ https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5002-1 https://ubuntu.com/security/notices/USN-5003-1 https://ubuntu.com/security/notices/USN-5082-1 https://www.openwall.com/lists/oss-security/2021/06/19/1
|
| kernel-headers | CVE-2021-3612 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-3612 https://bugzilla.redhat.com/show_bug.cgi?id=1974079 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3612 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-3612.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKGI562LFV5MESTMVTCG5RORSBT6NGBN/ https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/ https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/T/#u https://security.netapp.com/advisory/ntap-20210805-0005/ https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5071-3 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5073-3 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5106-1 https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1
|
| kernel-headers | CVE-2021-3640 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3640 https://bugzilla.redhat.com/show_bug.cgi?id=1980646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640 https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=99c23da0eed4fd20cae8243f2b51e10e66aa0951 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/bluetooth/sco.c?h=v5.16&id=99c23da0eed4fd20cae8243f2b51e10e66aa0951 https://github.com/torvalds/linux/commit/99c23da0eed4fd20cae8243f2b51e10e66aa0951 https://linux.oracle.com/cve/CVE-2021-3640.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lkml.org/lkml/2021/8/28/238 https://nvd.nist.gov/vuln/detail/CVE-2021-3640 https://security.netapp.com/advisory/ntap-20220419-0003/ https://ubuntu.com/security/CVE-2021-3640 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5267-1 https://ubuntu.com/security/notices/USN-5267-3 https://ubuntu.com/security/notices/USN-5268-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/07/22/1 https://x-lore.kernel.org/all/15f5a46.b79d9.17ba6802ccd.Coremail.linma@zju.edu.cn/ https://x-lore.kernel.org/all/20210810041410.142035-1-desmondcheongzx@gmail.com/ https://x-lore.kernel.org/all/20210828161818.31141-1-tiwai@suse.de/
|
| kernel-headers | CVE-2021-3653 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 | Expand...http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html https://access.redhat.com/security/cve/CVE-2021-3653 https://bugzilla.redhat.com/show_bug.cgi?id=1983686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653 https://github.com/torvalds/linux/commit/3d6368ef580a https://linux.oracle.com/cve/CVE-2021-3653.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-3653 https://ubuntu.com/security/notices/USN-5062-1 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5072-1 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5082-1 https://www.openwall.com/lists/oss-security/2021/08/16/1
|
| kernel-headers | CVE-2021-3655 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3655 https://bugzilla.redhat.com/show_bug.cgi?id=1984024 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3655 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=f9beb95e6a2669fa35e34a6ff52808b181efa20f https://linux.oracle.com/cve/CVE-2021-3655.html https://linux.oracle.com/errata/ELSA-2021-9488.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lore.kernel.org/netdev/599e6c1fdcc50f16597380118c9b3b6790241d50.1627439903.git.marcelo.leitner@gmail.com/ https://lore.kernel.org/netdev/e39b372644b6e5bf48df25e54b9172f34ec223a1.1624904195.git.marcelo.leitner@gmail.com/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-3655 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5161-1 https://ubuntu.com/security/notices/USN-5162-1 https://ubuntu.com/security/notices/USN-5163-1
|
| kernel-headers | CVE-2021-3656 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.45.1.el7 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36385.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0512.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3656.json https://access.redhat.com/security/cve/CVE-2021-3656 https://bugzilla.redhat.com/show_bug.cgi?id=1983988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656 https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc https://github.com/torvalds/linux/commit/89c8a4984fc9 https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc https://linux.oracle.com/cve/CVE-2021-3656.html https://linux.oracle.com/errata/ELSA-2022-9245.html https://nvd.nist.gov/vuln/detail/CVE-2021-3656 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5071-1 https://ubuntu.com/security/notices/USN-5071-2 https://ubuntu.com/security/notices/USN-5072-1 https://ubuntu.com/security/notices/USN-5073-1 https://ubuntu.com/security/notices/USN-5073-2 https://ubuntu.com/security/notices/USN-5082-1 https://www.openwall.com/lists/oss-security/2021/08/16/1
|
| kernel-headers | CVE-2021-3669 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-3669 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3669 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-3669.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lore.kernel.org/all/20210809203554.1562989-1-aquini@redhat.com/
|
| kernel-headers | CVE-2021-3714 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3714 https://arxiv.org/abs/2111.08553 https://arxiv.org/pdf/2111.08553.pdf
|
| kernel-headers | CVE-2021-3715 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3715 https://bugzilla.redhat.com/show_bug.cgi?id=1993988 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715 https://git.kernel.org/linus/ef299cc3fa1a9e1288665a9fdc8bff55629fd359 (5.6) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef299cc3fa1a9e1288665a9fdc8bff55629fd359 https://github.com/torvalds/linux/commit/ef299cc3fa1a9e1288665a9fdc8bff55629fd359 https://linux.oracle.com/cve/CVE-2021-3715.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://www.openwall.com/lists/oss-security/2021/09/07/1
|
| kernel-headers | CVE-2021-37159 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-37159 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37159 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-37159.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lore.kernel.org/linux-usb/20201002114323.GA3296553@kroah.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-37159 https://security.netapp.com/advisory/ntap-20210819-0003/ https://ubuntu.com/security/notices/USN-5092-1 https://ubuntu.com/security/notices/USN-5092-2 https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5163-1 https://ubuntu.com/security/notices/USN-5164-1 https://ubuntu.com/security/notices/USN-5361-1 https://www.spinics.net/lists/linux-usb/msg202228.html
|
| kernel-headers | CVE-2021-3744 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/09/14/1 https://access.redhat.com/security/cve/CVE-2021-3744 https://bugzilla.redhat.com/show_bug.cgi?id=2000627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3744 https://errata.almalinux.org/8/ALSA-2022-1988.html https://github.com/torvalds/linux/commit/505d9dcb0f7ddf9d075e729523a33d38642ae680 https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0 https://linux.oracle.com/cve/CVE-2021-3744.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3744 https://seclists.org/oss-sec/2021/q3/164 https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5140-1 https://ubuntu.com/security/notices/USN-5161-1 https://ubuntu.com/security/notices/USN-5162-1 https://ubuntu.com/security/notices/USN-5163-1 https://ubuntu.com/security/notices/USN-5164-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-3752 | MEDIUM | 3.10.0-1062.7.1.el7 | 3.10.0-1160.59.1.el7 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-3752 https://bugzilla.redhat.com/show_bug.cgi?id=1999544 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-3752.html https://linux.oracle.com/errata/ELSA-2022-9148.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-3752 https://security.netapp.com/advisory/ntap-20220318-0009/ https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5267-1 https://ubuntu.com/security/notices/USN-5267-3 https://ubuntu.com/security/notices/USN-5268-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/09/15/4
|
| kernel-headers | CVE-2021-3753 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3753 https://bugzilla.redhat.com/show_bug.cgi?id=1999589 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3753 https://git.kernel.org/linus/2287a51ba822384834dafc1c798453375d1107c7 https://github.com/torvalds/linux/commit/2287a51ba822384834dafc1c798453375d1107c7 https://linux.oracle.com/cve/CVE-2021-3753.html https://linux.oracle.com/errata/ELSA-2022-9088.html https://nvd.nist.gov/vuln/detail/CVE-2021-3753 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5117-1 https://ubuntu.com/security/notices/USN-5136-1 https://ubuntu.com/security/notices/USN-5137-1 https://ubuntu.com/security/notices/USN-5137-2 https://www.openwall.com/lists/oss-security/2021/09/01/4
|
| kernel-headers | CVE-2021-3764 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3764 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe https://linux.oracle.com/cve/CVE-2021-3764.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5140-1 https://ubuntu.com/security/notices/USN-5161-1 https://ubuntu.com/security/notices/USN-5162-1 https://ubuntu.com/security/notices/USN-5163-1 https://ubuntu.com/security/notices/USN-5164-1
|
| kernel-headers | CVE-2021-3772 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-3772 https://bugzilla.redhat.com/show_bug.cgi?id=2000694 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3772 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32f8807a48ae55be0e76880cfe8607a18b5bb0df https://github.com/torvalds/linux/commit/32f8807a48ae55be0e76880cfe8607a18b5bb0df https://linux.oracle.com/cve/CVE-2021-3772.html https://linux.oracle.com/errata/ELSA-2022-9260.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-3772 https://ubuntu.com/security/CVE-2021-3772 https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-3773 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-3773 https://bugzilla.redhat.com/show_bug.cgi?id=2004949 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2021-3773.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://nvd.nist.gov/vuln/detail/CVE-2021-3773
|
| kernel-headers | CVE-2021-39636 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-39636 https://android.googlesource.com/kernel/common/+/823f05d71506017aa4d47ae8b9546081686098fe https://android.googlesource.com/kernel/common/+/8a1b3c7bd71ef1e7a4537216858dbe7d13eec6ed https://android.googlesource.com/kernel/common/+/bb5bc03a5056b4b22f00b7333c42c861b83ef19f https://android.googlesource.com/kernel/common/+/d104670ce30b9f910f39fbaad3ec59f87fa43468 https://android.googlesource.com/kernel/common/+/dcd0c8c3e87cf08344e169fdb94eb7ec96c3c32a https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39636 https://source.android.com/security/bulletin/pixel/2021-12-01 https://ubuntu.com/security/notices/USN-5361-1
|
| kernel-headers | CVE-2021-39713 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html https://access.redhat.com/security/cve/CVE-2021-39713 https://android.googlesource.com/kernel/common/+/3a7d0d07a3867 https://android.googlesource.com/kernel/common/+/6f99528e97977 https://android.googlesource.com/kernel/common/+/86bd446b5cebd https://android.googlesource.com/kernel/common/+/9d7e82cec35c0 https://android.googlesource.com/kernel/common/+/e368fdb61d8e7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39713 https://source.android.com/security/bulletin/pixel/2022-03-01 https://syzkaller.appspot.com/bug?id=d7e411c5472dd5da33d8cc921ccadc747743a568 https://ubuntu.com/security/notices/USN-5413-1 https://ubuntu.com/security/notices/USN-5484-1
|
| kernel-headers | CVE-2021-4002 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21781.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3612.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3669.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3752.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3772.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3773.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4002.json https://access.redhat.com/security/cve/CVE-2021-4002 https://bugzilla.redhat.com/show_bug.cgi?id=2025726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4002 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/a4a118f2eead1d6c49e00765de89878288d4b890 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890 https://linux.oracle.com/cve/CVE-2021-4002.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-4002 https://ubuntu.com/security/notices/USN-5206-1 https://ubuntu.com/security/notices/USN-5207-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5211-1 https://ubuntu.com/security/notices/USN-5218-1 https://www.debian.org/security/2022/dsa-5096 https://www.openwall.com/lists/oss-security/2021/11/25/1
|
| kernel-headers | CVE-2021-4032 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4032 https://bugzilla.redhat.com/show_bug.cgi?id=2027403 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f7d8a19f9a056a05c5c509fa65af472a322abfee https://lkml.org/lkml/2021/9/8/587 https://nvd.nist.gov/vuln/detail/CVE-2021-4032
|
| kernel-headers | CVE-2021-40490 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-40490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40490 https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa https://linux.oracle.com/cve/CVE-2021-40490.html https://linux.oracle.com/errata/ELSA-2021-9488.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6VS2DLGT7TK7URKAS2KWJL3S533SGVA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJGX3DMJT6MRBW2XEF3TWVHYWZW3DG3N/ https://lore.kernel.org/linux-ext4/000000000000e5080305c9e51453@google.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-40490 https://security.netapp.com/advisory/ntap-20211004-0001/ https://ubuntu.com/security/notices/USN-5096-1 https://ubuntu.com/security/notices/USN-5113-1 https://ubuntu.com/security/notices/USN-5114-1 https://ubuntu.com/security/notices/USN-5115-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2 https://ubuntu.com/security/notices/USN-5120-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.debian.org/security/2021/dsa-4978
|
| kernel-headers | CVE-2021-4148 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4148 https://bugzilla.redhat.com/show_bug.cgi?id=2026487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4148 https://lkml.org/lkml/2021/9/12/323 https://lkml.org/lkml/2021/9/17/1037 https://lore.kernel.org/linux-mm/a07564a3-b2fc-9ffe-3ace-3f276075ea5c@google.com/ https://lore.kernel.org/lkml/CACkBjsYwLYLRmX8GpsDpMthagWOjWWrNxqY6ZLNQVr6yx+f5vA@mail.gmail.com/ https://lore.kernel.org/lkml/CAHbLzkrdGva2dzO36r62LKv_ip5trbMK0BO3vCeSBk2_7OE-zA@mail.gmail.com/ https://nvd.nist.gov/vuln/detail/CVE-2021-4148
|
| kernel-headers | CVE-2021-4149 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4149 https://bugzilla.redhat.com/show_bug.cgi?id=2026485 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4149 https://git.kernel.org/linus/19ea40dddf1833db868533958ca066f368862211 (5.15-rc6) https://linux.oracle.com/cve/CVE-2021-4149.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://lkml.org/lkml/2021/10/18/885 https://lkml.org/lkml/2021/9/13/2565 https://nvd.nist.gov/vuln/detail/CVE-2021-4149 https://ubuntu.com/security/notices/USN-5466-1
|
| kernel-headers | CVE-2021-4157 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4157 https://bugzilla.redhat.com/show_bug.cgi?id=2034342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4157 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/ed34695e15aba74f45247f1ee2cf7e09d449f925 (5.13-rc1) https://linux.oracle.com/cve/CVE-2021-4157.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2021-4157 https://security.netapp.com/advisory/ntap-20220602-0007/ https://ubuntu.com/security/notices/USN-5413-1
|
| kernel-headers | CVE-2021-4159 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4159 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4159
|
| kernel-headers | CVE-2021-41864 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-41864 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41864 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=30e29a9a2bc6a4888335a6ede968b75cd329657a https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a https://linux.oracle.com/cve/CVE-2021-41864.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-41864 https://security.netapp.com/advisory/ntap-20211029-0004/ https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5140-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5209-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-4203 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4203 https://bugs.chromium.org/p/project-zero/issues/detail?id=2230 https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1 https://bugzilla.redhat.com/show_bug.cgi?id=2036934 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4203 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/35306eb23814444bd4021f8a1c3047d3cb0c8b2b (5.15-rc4) https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814 https://linux.oracle.com/cve/CVE-2021-4203.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-4203
|
| kernel-headers | CVE-2021-4204 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4204 https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/impish/commit/?id=53fb7741ff9d546174dbb585957b4f8b6afbdb83 https://ubuntu.com/security/notices/USN-5217-1 https://ubuntu.com/security/notices/USN-5218-1 https://ubuntu.com/security/notices/USN-5219-1 https://www.openwall.com/lists/oss-security/2022/01/11/4
|
| kernel-headers | CVE-2021-43056 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/10/28/1 https://access.redhat.com/security/cve/CVE-2021-43056 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43056 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 https://git.kernel.org/linus/cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 (5.15-rc6) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337 https://linux.oracle.com/cve/CVE-2021-43056.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AA7EAPPKWG4LMTQQLNNSKATY6ST2KQFE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBM4FP3IT3JZ2O7EBS7TEOG657N4ZGRE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRAIS3PG4EV5WFLYESR6FXWM4BJJGWVA/ https://lore.kernel.org/linuxppc-dev/87pmrtbbdt.fsf@mpe.ellerman.id.au/T/#u https://ubuntu.com/security/notices/USN-5139-1 https://ubuntu.com/security/notices/USN-5165-1 https://ubuntu.com/security/notices/USN-5208-1 https://ubuntu.com/security/notices/USN-5210-1 https://ubuntu.com/security/notices/USN-5218-1
|
| kernel-headers | CVE-2021-43975 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-43975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43975 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=b922f622592af76b57cbc566eaeccda0b31a3496 https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/ https://lore.kernel.org/netdev/163698540868.13805.17800408021782408762.git-patchwork-notify@kernel.org/T/ https://nvd.nist.gov/vuln/detail/CVE-2021-43975 https://security.netapp.com/advisory/ntap-20211210-0001/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5294-1 https://ubuntu.com/security/notices/USN-5294-2 https://ubuntu.com/security/notices/USN-5297-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5368-1 https://ubuntu.com/security/notices/USN-5385-1 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-43976 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-43976 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43976 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84 https://linux.oracle.com/cve/CVE-2021-43976.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/ https://nvd.nist.gov/vuln/detail/CVE-2021-43976 https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/ https://security.netapp.com/advisory/ntap-20211210-0001/ https://ubuntu.com/security/notices/USN-5302-1 https://ubuntu.com/security/notices/USN-5338-1 https://ubuntu.com/security/notices/USN-5339-1 https://ubuntu.com/security/notices/USN-5361-1 https://ubuntu.com/security/notices/USN-5377-1 https://ubuntu.com/security/notices/USN-5383-1 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2021-45485 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-45485 https://arxiv.org/pdf/2112.09604.pdf https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.13.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45485 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/62f20e068ccc50d6ab66fdb72ba90da2b9418c99 (5.14-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99 https://linux.oracle.com/cve/CVE-2021-45485.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/ https://nvd.nist.gov/vuln/detail/CVE-2021-45485 https://security.netapp.com/advisory/ntap-20220121-0001/ https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1
|
| kernel-headers | CVE-2021-45486 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-45486 https://arxiv.org/pdf/2112.09604.pdf https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45486 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba (5.13-rc1) https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba https://linux.oracle.com/cve/CVE-2021-45486.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://nvd.nist.gov/vuln/detail/CVE-2021-45486 https://ubuntu.com/security/notices/USN-5361-1
|
| kernel-headers | CVE-2021-45868 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-45868 https://bugzilla.kernel.org/show_bug.cgi?id=214655 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45868 https://git.kernel.org/linus/9bf3d20331295b1ecb81f4ed9ef358c51699a050 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9bf3d20331295b1ecb81f4ed9ef358c51699a050 https://linux.oracle.com/cve/CVE-2021-45868.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://nvd.nist.gov/vuln/detail/CVE-2021-45868 https://security.netapp.com/advisory/ntap-20220419-0003/ https://www.openwall.com/lists/oss-security/2022/03/17/1 https://www.openwall.com/lists/oss-security/2022/03/17/2
|
| kernel-headers | CVE-2022-0480 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0480 https://bugzilla.redhat.com/show_bug.cgi?id=2049700 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480 https://git.kernel.org/linus/0f12156dff2862ac54235fc72703f18770769042 (5.15-rc1) https://github.com/kata-containers/kata-containers/issues/3373 https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm@linux-foundation.org/
|
| kernel-headers | CVE-2022-0494 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0494 https://bugzilla.redhat.com/show_bug.cgi?id=2039448 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494 https://git.kernel.org/linus/cc8f7fe1f5eab010191aa4570f27641876fa1267 (5.17-rc5) https://lore.kernel.org/all/20220216084038.15635-1-tcs.kernel@gmail.com/ https://nvd.nist.gov/vuln/detail/CVE-2022-0494 https://ubuntu.com/security/notices/USN-5381-1 https://www.debian.org/security/2022/dsa-5161
|
| kernel-headers | CVE-2022-0617 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/04/13/2 https://access.redhat.com/security/cve/CVE-2022-0617 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617 https://git.kernel.org/linus/7fc3b7c2981bbd1047916ade327beccb90994eee https://git.kernel.org/linus/ea8569194b43f0f01f0a84c689388542c7254a1f https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fc3b7c2981bbd1047916ade327beccb90994eee https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ea8569194b43f0f01f0a84c689388542c7254a1f https://linux.oracle.com/cve/CVE-2022-0617.html https://linux.oracle.com/errata/ELSA-2022-9348.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/lkml/20220114172329.ygzry5rlz64ua2nr@quack3.lan/T/ https://nvd.nist.gov/vuln/detail/CVE-2022-0617 https://ubuntu.com/security/notices/USN-5383-1 https://ubuntu.com/security/notices/USN-5384-1 https://ubuntu.com/security/notices/USN-5385-1 https://www.debian.org/security/2022/dsa-5095 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2022-0812 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0812 https://bugzilla.redhat.com/show_bug.cgi?id=2058361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0812 https://twitter.com/iMilnb/status/1497125078252806161
|
| kernel-headers | CVE-2022-0850 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0850 https://bugzilla.redhat.com/show_bug.cgi?id=2060606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0850 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8
|
| kernel-headers | CVE-2022-0854 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/dma/swiotlb.c?h=v5.17-rc8&id=aa6f8dcbab473f3a3c7454b74caa46d36cdc5d13 https://nvd.nist.gov/vuln/detail/CVE-2022-0854 https://ubuntu.com/security/notices/USN-5381-1 https://www.debian.org/security/2022/dsa-5161
|
| kernel-headers | CVE-2022-1011 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1011 https://bugzilla.redhat.com/show_bug.cgi?id=2064855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011 https://errata.almalinux.org/8/ALSA-2022-1988.html https://git.kernel.org/linus/0c4bcfdecb1ac0967619ee7ff44871d93c08c909 (5.17-rc8) https://git.kernel.org/pub/scm/linux/kernel/git/mszeredi/fuse.git/commit/?h=for-next https://linux.oracle.com/cve/CVE-2022-1011.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BG4J46EMFPDD5QHYXDUI3PJCZQ7HQAZR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C5AUUDGSDLGYU7SZSK4PFAN22NISQZBT/ https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/ https://nvd.nist.gov/vuln/detail/CVE-2022-1011 https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5467-1
|
| kernel-headers | CVE-2022-1016 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ https://access.redhat.com/security/cve/CVE-2022-1016 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016 https://linux.oracle.com/cve/CVE-2022-1016.html https://linux.oracle.com/errata/ELSA-2022-9368.html https://seclists.org/oss-sec/2022/q1/205 https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5383-1 https://ubuntu.com/security/notices/USN-5390-1 https://ubuntu.com/security/notices/USN-5390-2 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5466-1 https://www.openwall.com/lists/oss-security/2022/03/28/5
|
| kernel-headers | CVE-2022-1280 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1280 https://bugzilla.redhat.com/show_bug.cgi?id=2071022 https://www.openwall.com/lists/oss-security/2022/04/12/3
|
| kernel-headers | CVE-2022-1353 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1353 https://bugzilla.redhat.com/show_bug.cgi?id=2066819 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353 https://git.kernel.org/linus/9a564bccb78a76740ea9d75a259942df8143d02c (5.17) https://github.com/torvalds/linux/commit/9a564bccb78a76740ea9d75a259942df8143d02c https://linux.oracle.com/cve/CVE-2022-1353.html https://linux.oracle.com/errata/ELSA-2022-9480.html https://nvd.nist.gov/vuln/detail/CVE-2022-1353 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
| kernel-headers | CVE-2022-1652 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1652 https://bugzilla.redhat.com/show_bug.cgi?id=1832397 https://bugzilla.redhat.com/show_bug.cgi?id=2084458 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1652 https://francozappa.github.io/about-bias/ https://kb.cert.org/vuls/id/647177/ https://nvd.nist.gov/vuln/detail/CVE-2022-1652 https://www.openwall.com/lists/oss-security/2022/05/10/1 https://www.openwall.com/lists/oss-security/2022/05/10/2
|
| kernel-headers | CVE-2022-1678 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1678 https://anas.openanolis.cn/cves/detail/CVE-2022-1678 https://anas.openanolis.cn/errata/detail/ANSA-2022:0143 https://bugzilla.openanolis.cn/show_bug.cgi?id=61 https://gitee.com/anolis/cloud-kernel/commit/bed537da691b https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing@gmail.com/
|
| kernel-headers | CVE-2022-1679 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1679 https://lore.kernel.org/lkml/87ilqc7jv9.fsf@kernel.org/t/
|
| kernel-headers | CVE-2022-1729 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1729 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729 https://github.com/torvalds/linux/commit/3ac6487e584a1eb54071dbe1212e05b884136704 https://linux.oracle.com/cve/CVE-2022-1729.html https://linux.oracle.com/errata/ELSA-2022-9413.html https://lore.kernel.org/all/20220520183806.GV2578@worktop.programming.kicks-ass.net/T/#u https://www.openwall.com/lists/oss-security/2022/05/20/2
|
| kernel-headers | CVE-2022-1734 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/06/05/4 http://www.openwall.com/lists/oss-security/2022/06/09/1 https://access.redhat.com/security/cve/CVE-2022-1734 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1734 https://git.kernel.org/linus/d270453a0d9ec10bb8a802a142fb1b3601a83098 (5.18-rc6) https://github.com/torvalds/linux/commit/d270453a0d9ec10bb8a802a142fb1b3601a83098 https://nvd.nist.gov/vuln/detail/CVE-2022-1734 https://ubuntu.com/security/notices/USN-5471-1
|
| kernel-headers | CVE-2022-1972 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1972 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1972 https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=fecf31ee395b0295f2d7260aa29946b7605f7c85 https://ubuntu.com/security/notices/USN-5468-1 https://ubuntu.com/security/notices/USN-5469-1 https://ubuntu.com/security/notices/USN-5470-1 https://ubuntu.com/security/notices/USN-5471-1 https://www.openwall.com/lists/oss-security/2022/06/02/1
|
| kernel-headers | CVE-2022-1976 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1976
|
| kernel-headers | CVE-2022-21499 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-21499 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499 https://git.kernel.org/linus/eadb2f47a3ced5c64b23b90fd2a3463f63726066 https://linux.oracle.com/cve/CVE-2022-21499.html https://linux.oracle.com/errata/ELSA-2022-9496.html https://ubuntu.com/security/notices/USN-5465-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5468-1 https://ubuntu.com/security/notices/USN-5469-1 https://ubuntu.com/security/notices/USN-5470-1 https://ubuntu.com/security/notices/USN-5471-1 https://ubuntu.com/security/notices/USN-5484-1 https://www.debian.org/security/2022/dsa-5161 https://www.openwall.com/lists/oss-security/2022/05/24/10 https://www.openwall.com/lists/oss-security/2022/05/24/7
|
| kernel-headers | CVE-2022-2153 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-2153 https://www.openwall.com/lists/oss-security/2022/06/22/1
|
| kernel-headers | CVE-2022-23222 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/01/14/1 http://www.openwall.com/lists/oss-security/2022/01/18/2 http://www.openwall.com/lists/oss-security/2022/06/01/1 http://www.openwall.com/lists/oss-security/2022/06/04/3 http://www.openwall.com/lists/oss-security/2022/06/07/3 https://access.redhat.com/security/cve/CVE-2022-23222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCR3LIRUEXR7CA63W5M2HT3K63MZGKBR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z5VTIZZUPC73IEJNZX66BY2YCBRZAELB/ https://nvd.nist.gov/vuln/detail/CVE-2022-23222 https://security.netapp.com/advisory/ntap-20220217-0002/ https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5337-1 https://ubuntu.com/security/notices/USN-5362-1 https://ubuntu.com/security/notices/USN-5368-1 https://www.debian.org/security/2022/dsa-5050 https://www.openwall.com/lists/oss-security/2022/01/13/1
|
| kernel-headers | CVE-2022-25265 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-25265 https://github.com/torvalds/linux/blob/1c33bb0507508af24fd754dd7123bd8e997fab2f/arch/x86/include/asm/elf.h#L281-L294 https://github.com/x0reaxeax/exec-prot-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-25265 https://security.netapp.com/advisory/ntap-20220318-0005/
|
| kernel-headers | CVE-2022-25375 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/02/21/1 https://access.redhat.com/security/cve/CVE-2022-25375 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.10 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25375 https://git.kernel.org/linus/38ea1eac7d88072bbffb630e2b3db83ca649b826 (5.17-rc4) https://github.com/szymonh/rndis-co https://github.com/torvalds/linux/commit/38ea1eac7d88072bbffb630e2b3db83ca649b826 https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2022-25375 https://ubuntu.com/security/notices/USN-5415-1 https://ubuntu.com/security/notices/USN-5417-1 https://ubuntu.com/security/notices/USN-5418-1 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096
|
| kernel-headers | CVE-2022-28356 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/04/06/1 https://access.redhat.com/security/cve/CVE-2022-28356 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356 https://git.kernel.org/linus/764f4eb6846f5475f1244767d24d25dd86528a4a https://github.com/torvalds/linux/commit/764f4eb6846f5475f1244767d24d25dd86528a4a https://nvd.nist.gov/vuln/detail/CVE-2022-28356 https://security.netapp.com/advisory/ntap-20220506-0006/ https://ubuntu.com/security/notices/USN-5381-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127 https://www.openwall.com/lists/oss-security/2022/04/06/1
|
| kernel-headers | CVE-2022-28388 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-28388 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388 https://git.kernel.org/linus/3d3925ff6433f98992685a9679613a2cc97f3ce2 (5.18-rc1) https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/ https://nvd.nist.gov/vuln/detail/CVE-2022-28388 https://security.netapp.com/advisory/ntap-20220513-0001/ https://ubuntu.com/security/notices/USN-5416-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
| kernel-headers | CVE-2022-28389 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-28389 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389 https://git.kernel.org/linus/04c9b00ba83594a29813d6b1fb8fdc93a3915174 (5.18-rc1) https://github.com/torvalds/linux/commit/04c9b00ba83594a29813d6b1fb8fdc93a3915174 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/ https://nvd.nist.gov/vuln/detail/CVE-2022-28389 https://security.netapp.com/advisory/ntap-20220513-0001/ https://ubuntu.com/security/notices/USN-5416-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
| kernel-headers | CVE-2022-28390 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-28390 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390 https://git.kernel.org/linus/c70222752228a62135cee3409dccefd494a24646 (5.18-rc1) https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IHHC455LMSJNG4CSZ5CEAHYWY2DE5YW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LAWC35TO642FOP3UCA3C6IF7NAUFOVZ6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFMPUI3WI4U2F7ONHRW36WDY4ZE7LGGT/ https://nvd.nist.gov/vuln/detail/CVE-2022-28390 https://security.netapp.com/advisory/ntap-20220513-0001/ https://ubuntu.com/security/notices/USN-5413-1 https://ubuntu.com/security/notices/USN-5416-1 https://ubuntu.com/security/notices/USN-5466-1 https://ubuntu.com/security/notices/USN-5467-1 https://ubuntu.com/security/notices/USN-5468-1 https://ubuntu.com/security/notices/USN-5469-1 https://www.debian.org/security/2022/dsa-5127
|
| kernel-headers | CVE-2022-28796 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-28796 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.1 https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e https://nvd.nist.gov/vuln/detail/CVE-2022-28796 https://security.netapp.com/advisory/ntap-20220506-0006/
|
| kernel-headers | CVE-2022-28893 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/04/11/3 http://www.openwall.com/lists/oss-security/2022/04/11/4 http://www.openwall.com/lists/oss-security/2022/04/11/5 https://access.redhat.com/security/cve/CVE-2022-28893 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1a3b1bba7c7a5eb8a11513cf88427cb9d77bc60a https://github.com/torvalds/linux/commit/f00432063db1a0db484e85193eccc6845435b80e https://nvd.nist.gov/vuln/detail/CVE-2022-28893 https://security.netapp.com/advisory/ntap-20220526-0002/ https://www.debian.org/security/2022/dsa-5161 https://www.openwall.com/lists/oss-security/2022/04/11/3 https://www.openwall.com/lists/oss-security/2022/04/11/5
|
| kernel-headers | CVE-2022-29581 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html http://www.openwall.com/lists/oss-security/2022/05/18/2 https://access.redhat.com/security/cve/CVE-2022-29581 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8 https://kernel.dance/#3db09e762dc79584a69c10d74a6b98f89a9979f8 https://nvd.nist.gov/vuln/detail/CVE-2022-29581 https://ubuntu.com/security/notices/USN-5442-1 https://ubuntu.com/security/notices/USN-5442-2 https://ubuntu.com/security/notices/USN-5443-1 https://ubuntu.com/security/notices/USN-5443-2 https://ubuntu.com/security/notices/USN-5444-1
|
| kernel-headers | CVE-2022-30594 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html https://access.redhat.com/security/cve/CVE-2022-30594 https://bugs.chromium.org/p/project-zero/issues/detail?id=2276 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.2 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee1fee900537b5d9560e9f937402de5ddc8412f3 https://git.kernel.org/linus/ee1fee900537b5d9560e9f937402de5ddc8412f3 (5.18-rc1) https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3 https://nvd.nist.gov/vuln/detail/CVE-2022-30594 https://ubuntu.com/security/notices/USN-5442-1 https://ubuntu.com/security/notices/USN-5442-2 https://ubuntu.com/security/notices/USN-5443-1 https://ubuntu.com/security/notices/USN-5443-2 https://ubuntu.com/security/notices/USN-5465-1
|
| kernel-headers | CVE-2022-32981 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/06/14/3 https://access.redhat.com/security/cve/CVE-2022-32981 https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=8e1278444446fc97778a5e5c99bca1ce0bbc5ec9
|
| kernel-headers | CVE-2022-33981 | MEDIUM | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-33981 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.6 https://exchange.xforce.ibmcloud.com/vulnerabilities/225362 https://github.com/torvalds/linux/commit/233087ca063686964a53c829d547c7571e3f67bf https://seclists.org/oss-sec/2022/q2/66
|
| kernel-headers | CVE-2014-0131 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1fd819ecb90cc9b822cd84d3056ddba315d3340f http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html http://www.openwall.com/lists/oss-security/2014/03/10/4 http://www.spinics.net/lists/netdev/msg274250.html http://www.spinics.net/lists/netdev/msg274316.html https://access.redhat.com/security/cve/CVE-2014-0131 https://bugzilla.redhat.com/show_bug.cgi?id=1074589 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0131 https://github.com/torvalds/linux/commit/1fd819ecb90cc9b822cd84d3056ddba315d3340f https://ubuntu.com/security/notices/USN-2283-1 https://ubuntu.com/security/notices/USN-2284-1 https://ubuntu.com/security/notices/USN-2285-1 https://ubuntu.com/security/notices/USN-2286-1 https://ubuntu.com/security/notices/USN-2287-1 https://ubuntu.com/security/notices/USN-2289-1
|
| kernel-headers | CVE-2014-2038 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=263b4509ec4d47e0da3e753f85a39ea12d1eff24 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.3 http://www.openwall.com/lists/oss-security/2014/02/20/16 http://www.ubuntu.com/usn/USN-2137-1 http://www.ubuntu.com/usn/USN-2140-1 https://access.redhat.com/security/cve/CVE-2014-2038 https://bugzilla.redhat.com/show_bug.cgi?id=1066939 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2038 https://git.kernel.org/linus/263b4509ec4d47e0da3e753f85a39ea12d1eff24 https://github.com/torvalds/linux/commit/263b4509ec4d47e0da3e753f85a39ea12d1eff24 https://ubuntu.com/security/notices/USN-2137-1 https://ubuntu.com/security/notices/USN-2140-1
|
| kernel-headers | CVE-2014-8181 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2014-8181 https://bugzilla.redhat.com/show_bug.cgi?id=1335817
|
| kernel-headers | CVE-2014-9731 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00049.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2 http://www.openwall.com/lists/oss-security/2015/06/03/4 http://www.securityfocus.com/bid/75001 https://access.redhat.com/security/cve/CVE-2014-9731 https://bugzilla.redhat.com/show_bug.cgi?id=1228220 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731 https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14 https://source.android.com/security/bulletin/2017-07-01 https://ubuntu.com/security/notices/USN-2517-1 https://ubuntu.com/security/notices/USN-2518-1 https://ubuntu.com/security/notices/USN-2541-1 https://ubuntu.com/security/notices/USN-2542-1 https://ubuntu.com/security/notices/USN-2543-1 https://ubuntu.com/security/notices/USN-2544-1
|
| kernel-headers | CVE-2015-1142857 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://seclists.org/oss-sec/2015/q4/425 https://access.redhat.com/security/cve/CVE-2015-1142857 https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00046&languageid=en-fr https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-smolyar.pdf
|
| kernel-headers | CVE-2015-1350 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://marc.info/?l=linux-kernel&m=142153722930533&w=2 http://www.openwall.com/lists/oss-security/2015/01/24/5 http://www.securityfocus.com/bid/76075 https://access.redhat.com/security/cve/CVE-2015-1350 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770492 https://bugzilla.redhat.com/show_bug.cgi?id=1185139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1350 https://ubuntu.com/security/notices/USN-3361-1 https://ubuntu.com/security/notices/USN-4904-1
|
| kernel-headers | CVE-2015-1420 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://marc.info/?l=linux-kernel&m=142247707318982&w=2 http://www.debian.org/security/2015/dsa-3170 http://www.openwall.com/lists/oss-security/2015/01/29/12 http://www.securityfocus.com/bid/72357 http://www.ubuntu.com/usn/USN-2660-1 http://www.ubuntu.com/usn/USN-2661-1 http://www.ubuntu.com/usn/USN-2665-1 http://www.ubuntu.com/usn/USN-2667-1 https://access.redhat.com/security/cve/CVE-2015-1420 https://bugzilla.redhat.com/show_bug.cgi?id=1187534 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420 https://linux.oracle.com/cve/CVE-2015-1420.html https://linux.oracle.com/errata/ELSA-2017-3516.html https://ubuntu.com/security/notices/USN-2660-1 https://ubuntu.com/security/notices/USN-2661-1 https://ubuntu.com/security/notices/USN-2662-1 https://ubuntu.com/security/notices/USN-2663-1 https://ubuntu.com/security/notices/USN-2664-1 https://ubuntu.com/security/notices/USN-2665-1 https://ubuntu.com/security/notices/USN-2666-1 https://ubuntu.com/security/notices/USN-2667-1
|
| kernel-headers | CVE-2015-2877 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.antoniobarresi.com/files/cain_advisory.txt http://www.kb.cert.org/vuls/id/935424 http://www.securityfocus.com/bid/76256 https://access.redhat.com/security/cve/CVE-2015-2877 https://bugzilla.redhat.com/show_bug.cgi?id=1252096 https://www.kb.cert.org/vuls/id/BGAR-A2CNKG https://www.kb.cert.org/vuls/id/BLUU-9ZAHZH https://www.usenix.org/system/files/conference/woot15/woot15-paper-barresi.pdf
|
| kernel-headers | CVE-2015-3291 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d http://www.debian.org/security/2015/dsa-3313 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6 http://www.openwall.com/lists/oss-security/2015/07/22/7 http://www.securityfocus.com/bid/76003 http://www.ubuntu.com/usn/USN-2687-1 http://www.ubuntu.com/usn/USN-2688-1 http://www.ubuntu.com/usn/USN-2689-1 http://www.ubuntu.com/usn/USN-2690-1 http://www.ubuntu.com/usn/USN-2691-1 https://access.redhat.com/security/cve/CVE-2015-3291 https://bugzilla.redhat.com/show_bug.cgi?id=1243489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3291 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=810bc075f78ff2c221536eb3008eac6a492dba2d https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a27507ca2d796cfa8d907de31ad730359c8a6d06 (prerequisite) https://github.com/torvalds/linux/commit/810bc075f78ff2c221536eb3008eac6a492dba2d https://security-tracker.debian.org/tracker/CVE-2015-3291 https://ubuntu.com/security/notices/USN-2687-1 https://ubuntu.com/security/notices/USN-2688-1 https://ubuntu.com/security/notices/USN-2689-1 https://ubuntu.com/security/notices/USN-2690-1 https://ubuntu.com/security/notices/USN-2691-1 https://ubuntu.com/security/notices/USN-2700-1 https://ubuntu.com/security/notices/USN-2701-1
|
| kernel-headers | CVE-2015-5257 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cbb4be652d374f64661137756b8f357a1827d6a4 http://www.debian.org/security/2015/dsa-3372 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.4 http://www.openwall.com/lists/oss-security/2015/09/23/1 http://www.securityfocus.com/bid/76834 http://www.ubuntu.com/usn/USN-2792-1 http://www.ubuntu.com/usn/USN-2794-1 http://www.ubuntu.com/usn/USN-2795-1 http://www.ubuntu.com/usn/USN-2798-1 http://www.ubuntu.com/usn/USN-2799-1 https://access.redhat.com/security/cve/CVE-2015-5257 https://bugzilla.redhat.com/show_bug.cgi?id=1265607 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5257 https://github.com/torvalds/linux/commit/cbb4be652d374f64661137756b8f357a1827d6a4 https://linux.oracle.com/cve/CVE-2015-5257.html https://linux.oracle.com/errata/ELSA-2017-3567.html https://marc.info/?l=linux-usb&m=144303376328355 https://ubuntu.com/security/notices/USN-2792-1 https://ubuntu.com/security/notices/USN-2794-1 https://ubuntu.com/security/notices/USN-2795-1 https://ubuntu.com/security/notices/USN-2796-1 https://ubuntu.com/security/notices/USN-2797-1 https://ubuntu.com/security/notices/USN-2798-1 https://ubuntu.com/security/notices/USN-2799-1
|
| kernel-headers | CVE-2015-5697 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b6878d9e03043695dbf3fa1caa6dfc09db225b16 http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163661.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163711.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164137.html http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164193.html http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html http://www.debian.org/security/2015/dsa-3329 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.6 http://www.openwall.com/lists/oss-security/2015/07/28/2 http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html http://www.securityfocus.com/bid/76066 http://www.securitytracker.com/id/1033211 http://www.ubuntu.com/usn/USN-2731-1 http://www.ubuntu.com/usn/USN-2732-1 http://www.ubuntu.com/usn/USN-2748-1 http://www.ubuntu.com/usn/USN-2749-1 http://www.ubuntu.com/usn/USN-2751-1 http://www.ubuntu.com/usn/USN-2752-1 http://www.ubuntu.com/usn/USN-2777-1 https://access.redhat.com/security/cve/CVE-2015-5697 https://bugzilla.redhat.com/show_bug.cgi?id=1249011 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5697 https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=77ba0569d4c8389c0a2162ab0c7c16a6f3b199e4 https://github.com/torvalds/linux/commit/b6878d9e03043695dbf3fa1caa6dfc09db225b16 https://linux.oracle.com/cve/CVE-2015-5697.html https://linux.oracle.com/errata/ELSA-2015-3068.html https://ubuntu.com/security/notices/USN-2731-1 https://ubuntu.com/security/notices/USN-2732-1 https://ubuntu.com/security/notices/USN-2748-1 https://ubuntu.com/security/notices/USN-2749-1 https://ubuntu.com/security/notices/USN-2751-1 https://ubuntu.com/security/notices/USN-2752-1 https://ubuntu.com/security/notices/USN-2777-1
|
| kernel-headers | CVE-2015-6252 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5 http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2015/dsa-3364 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.5 http://www.openwall.com/lists/oss-security/2015/08/18/3 http://www.securityfocus.com/bid/76400 http://www.securitytracker.com/id/1033666 http://www.ubuntu.com/usn/USN-2748-1 http://www.ubuntu.com/usn/USN-2749-1 http://www.ubuntu.com/usn/USN-2751-1 http://www.ubuntu.com/usn/USN-2752-1 http://www.ubuntu.com/usn/USN-2759-1 http://www.ubuntu.com/usn/USN-2760-1 http://www.ubuntu.com/usn/USN-2777-1 https://access.redhat.com/security/cve/CVE-2015-6252 https://bugzilla.redhat.com/show_bug.cgi?id=1251839 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6252 https://github.com/torvalds/linux/commit/7932c0bd7740f4cd2aa168d3ce0199e7af7d72d5 https://linux.oracle.com/cve/CVE-2015-6252.html https://linux.oracle.com/errata/ELSA-2017-3567.html https://lkml.org/lkml/2015/8/10/375 https://ubuntu.com/security/notices/USN-2748-1 https://ubuntu.com/security/notices/USN-2749-1 https://ubuntu.com/security/notices/USN-2751-1 https://ubuntu.com/security/notices/USN-2752-1 https://ubuntu.com/security/notices/USN-2759-1 https://ubuntu.com/security/notices/USN-2760-1 https://ubuntu.com/security/notices/USN-2777-1
|
| kernel-headers | CVE-2015-7515 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3607 http://www.securityfocus.com/bid/84288 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 https://access.redhat.com/security/cve/CVE-2015-7515 https://bugzilla.redhat.com/show_bug.cgi?id=1285326 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7515 https://github.com/torvalds/linux/commit/8e20cf2bce122ce9262d6034ee5d5b76fbb92f96 https://os-s.net/advisories/OSS-2016-05_aiptek.pdf https://security-tracker.debian.org/tracker/CVE-2015-7515 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://www.exploit-db.com/exploits/39544/
|
| kernel-headers | CVE-2015-7566 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://marc.info/?l=linux-usb&m=145260786729359&w=2 http://www.debian.org/security/2016/dsa-3448 http://www.debian.org/security/2016/dsa-3503 http://www.securityfocus.com/archive/1/537733/100/0/threaded http://www.securityfocus.com/bid/82975 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2948-1 http://www.ubuntu.com/usn/USN-2948-2 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2015-7566 https://bugzilla.redhat.com/show_bug.cgi?id=1283371 https://bugzilla.redhat.com/show_bug.cgi?id=1296466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566 https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c https://security-tracker.debian.org/tracker/CVE-2015-7566 https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2948-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2 https://www.exploit-db.com/exploits/39540/
|
| kernel-headers | CVE-2015-7799 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html http://www.debian.org/security/2015/dsa-3426 http://www.openwall.com/lists/oss-security/2015/10/09/1 http://www.openwall.com/lists/oss-security/2015/10/10/3 http://www.securityfocus.com/bid/77033 http://www.securitytracker.com/id/1033809 http://www.ubuntu.com/usn/USN-2841-1 http://www.ubuntu.com/usn/USN-2841-2 http://www.ubuntu.com/usn/USN-2842-1 http://www.ubuntu.com/usn/USN-2842-2 http://www.ubuntu.com/usn/USN-2843-1 http://www.ubuntu.com/usn/USN-2843-2 http://www.ubuntu.com/usn/USN-2843-3 http://www.ubuntu.com/usn/USN-2844-1 http://www.ubuntu.com/usn/USN-2886-1 https://access.redhat.com/security/cve/CVE-2015-7799 https://bugzilla.redhat.com/show_bug.cgi?id=1271134 https://code.google.com/p/android/issues/detail?id=187973 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799 https://ubuntu.com/security/notices/USN-2841-1 https://ubuntu.com/security/notices/USN-2841-2 https://ubuntu.com/security/notices/USN-2842-1 https://ubuntu.com/security/notices/USN-2842-2 https://ubuntu.com/security/notices/USN-2843-1 https://ubuntu.com/security/notices/USN-2843-2 https://ubuntu.com/security/notices/USN-2843-3 https://ubuntu.com/security/notices/USN-2844-1 https://ubuntu.com/security/notices/USN-2886-1 https://ubuntu.com/security/notices/USN-2886-2
|
| kernel-headers | CVE-2015-7833 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html http://seclists.org/bugtraq/2015/Oct/35 http://www.debian.org/security/2015/dsa-3396 http://www.debian.org/security/2015/dsa-3426 http://www.os-s.net/advisories/DOS-KernelCrashesOnInvalidUSBDeviceDescriptors-UsbvisionDriver.pdf http://www.securityfocus.com/archive/1/536629 http://www.securityfocus.com/bid/77030 http://www.securitytracker.com/id/1034452 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2947-1 http://www.ubuntu.com/usn/USN-2947-2 http://www.ubuntu.com/usn/USN-2947-3 http://www.ubuntu.com/usn/USN-2948-1 http://www.ubuntu.com/usn/USN-2948-2 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2015-7833 https://bugzilla.redhat.com/show_bug.cgi?id=1201858 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7833 https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2947-1 https://ubuntu.com/security/notices/USN-2947-2 https://ubuntu.com/security/notices/USN-2947-3 https://ubuntu.com/security/notices/USN-2948-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2
|
| kernel-headers | CVE-2015-8569 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ccfd238e5a0e670d8178cf50180ea81ae09ae1 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://twitter.com/grsecurity/statuses/676744240802750464 http://www.debian.org/security/2016/dsa-3434 http://www.openwall.com/lists/oss-security/2015/12/15/11 http://www.openwall.com/lists/oss-security/2015/12/15/7 http://www.securityfocus.com/bid/79428 http://www.securitytracker.com/id/1034549 http://www.ubuntu.com/usn/USN-2886-1 http://www.ubuntu.com/usn/USN-2888-1 http://www.ubuntu.com/usn/USN-2890-1 http://www.ubuntu.com/usn/USN-2890-2 http://www.ubuntu.com/usn/USN-2890-3 https://access.redhat.com/security/cve/CVE-2015-8569 https://bugzilla.redhat.com/show_bug.cgi?id=1292045 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569 https://github.com/torvalds/linux/commit/09ccfd238e5a0e670d8178cf50180ea81ae09ae1 https://linux.oracle.com/cve/CVE-2015-8569.html https://linux.oracle.com/errata/ELSA-2017-3534.html https://lkml.org/lkml/2015/12/14/252 https://twitter.com/grsecurity/status/676744240802750464 https://ubuntu.com/security/notices/USN-2886-1 https://ubuntu.com/security/notices/USN-2886-2 https://ubuntu.com/security/notices/USN-2888-1 https://ubuntu.com/security/notices/USN-2890-1 https://ubuntu.com/security/notices/USN-2890-2 https://ubuntu.com/security/notices/USN-2890-3 https://ubuntu.com/security/notices/USN-2907-1 https://ubuntu.com/security/notices/USN-2907-2 https://ubuntu.com/security/notices/USN-2910-1
|
| kernel-headers | CVE-2015-8575 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4 http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3434 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.4 http://www.openwall.com/lists/oss-security/2015/12/16/3 http://www.securityfocus.com/bid/79724 http://www.ubuntu.com/usn/USN-2886-1 http://www.ubuntu.com/usn/USN-2888-1 http://www.ubuntu.com/usn/USN-2890-1 http://www.ubuntu.com/usn/USN-2890-2 http://www.ubuntu.com/usn/USN-2890-3 https://access.redhat.com/security/cve/CVE-2015-8575 https://bugzilla.redhat.com/show_bug.cgi?id=1292840 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5233252fce714053f0151680933571a2da9cbfb4 https://github.com/torvalds/linux/commit/5233252fce714053f0151680933571a2da9cbfb4 https://linux.oracle.com/cve/CVE-2015-8575.html https://linux.oracle.com/errata/ELSA-2018-4172.html https://ubuntu.com/security/notices/USN-2886-1 https://ubuntu.com/security/notices/USN-2886-2 https://ubuntu.com/security/notices/USN-2888-1 https://ubuntu.com/security/notices/USN-2890-1 https://ubuntu.com/security/notices/USN-2890-2 https://ubuntu.com/security/notices/USN-2890-3 https://ubuntu.com/security/notices/USN-2907-1 https://ubuntu.com/security/notices/USN-2907-2 https://ubuntu.com/security/notices/USN-2910-1
|
| kernel-headers | CVE-2015-8785 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3ca8138f014a913f98e6ef40e939868e1e9ea876 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3503 http://www.openwall.com/lists/oss-security/2016/01/24/1 http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/81688 http://www.ubuntu.com/usn/USN-2886-1 https://access.redhat.com/security/cve/CVE-2015-8785 https://bugzilla.redhat.com/show_bug.cgi?id=1290642 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785 https://github.com/torvalds/linux/commit/3ca8138f014a913f98e6ef40e939868e1e9ea876 https://linux.oracle.com/cve/CVE-2015-8785.html https://linux.oracle.com/errata/ELSA-2016-3596.html https://ubuntu.com/security/notices/USN-2886-1 https://ubuntu.com/security/notices/USN-2886-2 https://ubuntu.com/security/notices/USN-2907-1 https://ubuntu.com/security/notices/USN-2907-2 https://ubuntu.com/security/notices/USN-2908-1 https://ubuntu.com/security/notices/USN-2908-2 https://ubuntu.com/security/notices/USN-2908-3 https://ubuntu.com/security/notices/USN-2909-1 https://ubuntu.com/security/notices/USN-2910-1
|
| kernel-headers | CVE-2015-8816 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e50293ef9775c5f1cf3fcc093037dd6a8c5684ea http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00026.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://source.android.com/security/bulletin/2016-07-01.html http://www.debian.org/security/2016/dsa-3503 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.3.5 http://www.openwall.com/lists/oss-security/2016/02/23/5 http://www.openwall.com/lists/oss-security/2016/02/24/3 http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/83363 http://www.spinics.net/lists/linux-usb/msg132311.html https://access.redhat.com/security/cve/CVE-2015-8816 https://bugzilla.redhat.com/show_bug.cgi?id=1311589 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816 https://github.com/torvalds/linux/commit/e50293ef9775c5f1cf3fcc093037dd6a8c5684ea https://linux.oracle.com/cve/CVE-2015-8816.html https://linux.oracle.com/errata/ELSA-2016-3596.html
|
| kernel-headers | CVE-2015-8964 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd42bf1197144ede075a9d4793123f7689e164bc http://source.android.com/security/bulletin/2016-11-01.html http://www.securityfocus.com/bid/94138 https://access.redhat.com/security/cve/CVE-2015-8964 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8964 https://github.com/torvalds/linux/commit/dd42bf1197144ede075a9d4793123f7689e164bc https://ubuntu.com/security/notices/USN-3161-1 https://ubuntu.com/security/notices/USN-3161-2 https://ubuntu.com/security/notices/USN-3161-3 https://ubuntu.com/security/notices/USN-3161-4 https://ubuntu.com/security/notices/USN-3360-1 https://ubuntu.com/security/notices/USN-3360-2
|
| kernel-headers | CVE-2016-0823 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html http://source.android.com/security/bulletin/2016-03-01.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.19.3 http://www.securityfocus.com/bid/84265 https://access.redhat.com/security/cve/CVE-2016-0823 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0823 https://github.com/torvalds/linux/commit/ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce https://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
|
| kernel-headers | CVE-2016-2184 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f886ca12765d20124bd06291c82951fd49a33be http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://seclists.org/bugtraq/2016/Mar/102 http://seclists.org/bugtraq/2016/Mar/88 http://seclists.org/bugtraq/2016/Mar/89 http://www.debian.org/security/2016/dsa-3607 http://www.securityfocus.com/bid/84340 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 https://access.redhat.com/security/cve/CVE-2016-2184 https://bugzilla.redhat.com/show_bug.cgi?id=1317012 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184 https://github.com/torvalds/linux/commit/0f886ca12765d20124bd06291c82951fd49a33be https://source.android.com/security/bulletin/2016-11-01.html https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1 https://www.exploit-db.com/exploits/39555/ https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1
|
| kernel-headers | CVE-2016-2185 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://seclists.org/bugtraq/2016/Mar/116 http://seclists.org/bugtraq/2016/Mar/90 http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.securityfocus.com/bid/84341 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 https://access.redhat.com/security/cve/CVE-2016-2185 https://bugzilla.redhat.com/show_bug.cgi?id=1283362 https://bugzilla.redhat.com/show_bug.cgi?id=1283363 https://bugzilla.redhat.com/show_bug.cgi?id=1317014 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185 https://github.com/torvalds/linux/commit/950336ba3e4a1ffd2ca60d29f6ef386dd2c7351d https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1
|
| kernel-headers | CVE-2016-2186 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c6ba456711687b794dcf285856fc14e2c76074f http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://marc.info/?l=linux-usb&m=145796479528669&w=2 http://seclists.org/bugtraq/2016/Mar/117 http://seclists.org/bugtraq/2016/Mar/85 http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.securityfocus.com/bid/84337 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 https://access.redhat.com/security/cve/CVE-2016-2186 https://bugzilla.redhat.com/show_bug.cgi?id=1317015 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186 https://github.com/torvalds/linux/commit/9c6ba456711687b794dcf285856fc14e2c76074f https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1
|
| kernel-headers | CVE-2016-2187 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html http://www.debian.org/security/2016/dsa-3607 http://www.securityfocus.com/bid/85425 http://www.ubuntu.com/usn/USN-2989-1 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 http://www.ubuntu.com/usn/USN-2998-1 http://www.ubuntu.com/usn/USN-3000-1 http://www.ubuntu.com/usn/USN-3001-1 http://www.ubuntu.com/usn/USN-3002-1 http://www.ubuntu.com/usn/USN-3003-1 http://www.ubuntu.com/usn/USN-3004-1 http://www.ubuntu.com/usn/USN-3005-1 http://www.ubuntu.com/usn/USN-3006-1 http://www.ubuntu.com/usn/USN-3007-1 https://access.redhat.com/security/cve/CVE-2016-2187 https://bugzilla.redhat.com/show_bug.cgi?id=1317017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187 https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d https://ubuntu.com/security/notices/USN-2989-1 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1 https://ubuntu.com/security/notices/USN-2998-1 https://ubuntu.com/security/notices/USN-3000-1 https://ubuntu.com/security/notices/USN-3001-1 https://ubuntu.com/security/notices/USN-3002-1 https://ubuntu.com/security/notices/USN-3003-1 https://ubuntu.com/security/notices/USN-3004-1 https://ubuntu.com/security/notices/USN-3005-1 https://ubuntu.com/security/notices/USN-3006-1 https://ubuntu.com/security/notices/USN-3007-1
|
| kernel-headers | CVE-2016-2188 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ec0ef3a82125efc36173062a50624550a900ae0 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://marc.info/?l=linux-usb&m=145796659429788&w=2 http://seclists.org/bugtraq/2016/Mar/118 http://seclists.org/bugtraq/2016/Mar/87 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 https://access.redhat.com/security/cve/CVE-2016-2188 https://bugzilla.redhat.com/show_bug.cgi?id=1317018 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188 https://github.com/torvalds/linux/commit/4ec0ef3a82125efc36173062a50624550a900ae0 https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1 https://www.exploit-db.com/exploits/39556/
|
| kernel-headers | CVE-2016-2543 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=030e2c78d3a91dd0d27fef37e91950dde333eba1 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3503 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1 http://www.openwall.com/lists/oss-security/2016/01/19/1 http://www.openwall.com/lists/oss-security/2016/02/23/11 http://www.securityfocus.com/bid/83377 http://www.securitytracker.com/id/1035304 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2931-1 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2016-2543 https://bugzilla.redhat.com/show_bug.cgi?id=1311554 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543 https://github.com/torvalds/linux/commit/030e2c78d3a91dd0d27fef37e91950dde333eba1 https://linux.oracle.com/cve/CVE-2016-2543.html https://linux.oracle.com/errata/ELSA-2018-4145.html https://lkml.org/lkml/2016/1/12/215 https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2931-1 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2
|
| kernel-headers | CVE-2016-2544 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3567eb6af614dac436c4b16a8d426f9faed639b3 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3503 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1 http://www.openwall.com/lists/oss-security/2016/01/19/1 http://www.openwall.com/lists/oss-security/2016/02/23/11 http://www.securityfocus.com/bid/83380 http://www.securitytracker.com/id/1035305 http://www.spinics.net/lists/alsa-devel/msg45102.html http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2931-1 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2016-2544 https://bugzilla.redhat.com/show_bug.cgi?id=1311558 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544 https://github.com/torvalds/linux/commit/3567eb6af614dac436c4b16a8d426f9faed639b3 https://linux.oracle.com/cve/CVE-2016-2544.html https://linux.oracle.com/errata/ELSA-2018-4145.html https://lkml.org/lkml/2016/1/12/465 https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2931-1 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2
|
| kernel-headers | CVE-2016-2545 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ee8413b01045c74340aa13ad5bdf905de32be736 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3503 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1 http://www.openwall.com/lists/oss-security/2016/01/19/1 http://www.openwall.com/lists/oss-security/2016/02/23/11 http://www.securityfocus.com/bid/83381 http://www.securitytracker.com/id/1035296 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2931-1 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2016-2545 https://bugzilla.redhat.com/show_bug.cgi?id=1311560 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545 https://github.com/torvalds/linux/commit/ee8413b01045c74340aa13ad5bdf905de32be736 https://linux.oracle.com/cve/CVE-2016-2545.html https://linux.oracle.com/errata/ELSA-2018-4145.html https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2931-1 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2
|
| kernel-headers | CVE-2016-2549 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2ba1fe7a06d3624f9a7586d672b55f08f7c670f3 http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.debian.org/security/2016/dsa-3503 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.1 http://www.openwall.com/lists/oss-security/2016/01/19/1 http://www.openwall.com/lists/oss-security/2016/02/23/11 http://www.securityfocus.com/bid/83382 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2931-1 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2016-2549 https://bugzilla.redhat.com/show_bug.cgi?id=1311570 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549 https://github.com/torvalds/linux/commit/2ba1fe7a06d3624f9a7586d672b55f08f7c670f3 https://linux.oracle.com/cve/CVE-2016-2549.html https://linux.oracle.com/errata/ELSA-2018-4145.html https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2931-1 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2
|
| kernel-headers | CVE-2016-2782 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cac9b50b0d75a1d50d6c056ff65c005f3224c8e0 http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://www.openwall.com/lists/oss-security/2016/02/28/9 http://www.ubuntu.com/usn/USN-2929-1 http://www.ubuntu.com/usn/USN-2929-2 http://www.ubuntu.com/usn/USN-2930-1 http://www.ubuntu.com/usn/USN-2930-2 http://www.ubuntu.com/usn/USN-2930-3 http://www.ubuntu.com/usn/USN-2932-1 http://www.ubuntu.com/usn/USN-2948-1 http://www.ubuntu.com/usn/USN-2948-2 http://www.ubuntu.com/usn/USN-2967-1 http://www.ubuntu.com/usn/USN-2967-2 https://access.redhat.com/security/cve/CVE-2016-2782 https://bugzilla.redhat.com/show_bug.cgi?id=1312670 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782 https://github.com/torvalds/linux/commit/cac9b50b0d75a1d50d6c056ff65c005f3224c8e0 https://linux.oracle.com/cve/CVE-2016-2782.html https://linux.oracle.com/errata/ELSA-2017-3567.html https://ubuntu.com/security/notices/USN-2929-1 https://ubuntu.com/security/notices/USN-2929-2 https://ubuntu.com/security/notices/USN-2930-1 https://ubuntu.com/security/notices/USN-2930-2 https://ubuntu.com/security/notices/USN-2930-3 https://ubuntu.com/security/notices/USN-2932-1 https://ubuntu.com/security/notices/USN-2948-1 https://ubuntu.com/security/notices/USN-2967-1 https://ubuntu.com/security/notices/USN-2967-2 https://www.exploit-db.com/exploits/39539/
|
| kernel-headers | CVE-2016-3136 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4e9a0b05257f29cf4b75f3209243ed71614d062e http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://seclists.org/bugtraq/2016/Mar/57 http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.openwall.com/lists/oss-security/2016/03/14/2 http://www.securityfocus.com/bid/84299 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 http://www.ubuntu.com/usn/USN-3000-1 https://access.redhat.com/security/cve/CVE-2016-3136 https://bugzilla.redhat.com/show_bug.cgi?id=1283370 https://bugzilla.redhat.com/show_bug.cgi?id=1317007 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136 https://github.com/torvalds/linux/commit/4e9a0b05257f29cf4b75f3209243ed71614d062e https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1 https://ubuntu.com/security/notices/USN-3000-1 https://www.exploit-db.com/exploits/39541/
|
| kernel-headers | CVE-2016-3137 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://seclists.org/bugtraq/2016/Mar/55 http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.openwall.com/lists/oss-security/2016/03/14/3 http://www.securityfocus.com/bid/84300 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 http://www.ubuntu.com/usn/USN-3000-1 https://access.redhat.com/security/cve/CVE-2016-3137 https://bugzilla.redhat.com/show_bug.cgi?id=1283368 https://bugzilla.redhat.com/show_bug.cgi?id=1316996 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137 https://github.com/torvalds/linux/commit/c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754 https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1 https://ubuntu.com/security/notices/USN-3000-1
|
| kernel-headers | CVE-2016-3138 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8835ba4a39cf53f705417b3b3a94eb067673f2c9 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://seclists.org/bugtraq/2016/Mar/54 http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.openwall.com/lists/oss-security/2016/03/14/4 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2969-1 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 https://access.redhat.com/security/cve/CVE-2016-3138 https://bugzilla.redhat.com/show_bug.cgi?id=1283366 https://bugzilla.redhat.com/show_bug.cgi?id=1316204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138 https://github.com/torvalds/linux/commit/8835ba4a39cf53f705417b3b3a94eb067673f2c9 https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2969-1 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1
|
| kernel-headers | CVE-2016-3139 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=471d17148c8b4174ac5f5283a73316d12c4379bc http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html https://access.redhat.com/security/cve/CVE-2016-3139 https://bugzilla.redhat.com/show_bug.cgi?id=1283375 https://bugzilla.redhat.com/show_bug.cgi?id=1283377 https://bugzilla.redhat.com/show_bug.cgi?id=1316993 https://github.com/torvalds/linux/commit/471d17148c8b4174ac5f5283a73316d12c4379bc https://linux.oracle.com/cve/CVE-2016-3139.html https://linux.oracle.com/errata/ELSA-2019-4644.html https://security-tracker.debian.org/tracker/CVE-2016-3139 https://www.exploit-db.com/exploits/39538/
|
| kernel-headers | CVE-2016-3140 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://seclists.org/bugtraq/2016/Mar/61 http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.openwall.com/lists/oss-security/2016/03/14/6 http://www.securityfocus.com/bid/84304 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 http://www.ubuntu.com/usn/USN-3000-1 https://access.redhat.com/security/cve/CVE-2016-3140 https://bugzilla.redhat.com/show_bug.cgi?id=1283378 https://bugzilla.redhat.com/show_bug.cgi?id=1316995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140 https://github.com/torvalds/linux/commit/5a07975ad0a36708c6b0a5b9fea1ff811d0b0c1f https://linux.oracle.com/cve/CVE-2016-3140.html https://linux.oracle.com/errata/ELSA-2017-3535.html https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1 https://ubuntu.com/security/notices/USN-3000-1 https://www.exploit-db.com/exploits/39537/
|
| kernel-headers | CVE-2016-3689 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.1 http://www.openwall.com/lists/oss-security/2016/03/30/6 http://www.securitytracker.com/id/1035441 http://www.ubuntu.com/usn/USN-2968-1 http://www.ubuntu.com/usn/USN-2968-2 http://www.ubuntu.com/usn/USN-2970-1 http://www.ubuntu.com/usn/USN-2971-1 http://www.ubuntu.com/usn/USN-2971-2 http://www.ubuntu.com/usn/USN-2971-3 http://www.ubuntu.com/usn/USN-3000-1 https://access.redhat.com/security/cve/CVE-2016-3689 https://bugzilla.novell.com/show_bug.cgi?id=971628 https://bugzilla.redhat.com/show_bug.cgi?id=1320060 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689 https://github.com/torvalds/linux/commit/a0ad220c96692eda76b2e3fd7279f3dcd1d8a8ff https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2968-1 https://ubuntu.com/security/notices/USN-2968-2 https://ubuntu.com/security/notices/USN-2970-1 https://ubuntu.com/security/notices/USN-2971-1 https://ubuntu.com/security/notices/USN-2971-2 https://ubuntu.com/security/notices/USN-2971-3 https://ubuntu.com/security/notices/USN-3000-1
|
| kernel-headers | CVE-2016-3695 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/102327 https://access.redhat.com/security/cve/CVE-2016-3695 https://bugzilla.redhat.com/show_bug.cgi?id=1322755 https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
|
| kernel-headers | CVE-2016-3951 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274 http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00060.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html http://seclists.org/oss-sec/2016/q2/19 http://www.debian.org/security/2016/dsa-3607 http://www.openwall.com/lists/oss-security/2016/04/06/4 http://www.securityfocus.com/bid/91028 http://www.securitytracker.com/id/1036763 http://www.ubuntu.com/usn/USN-2989-1 http://www.ubuntu.com/usn/USN-2998-1 http://www.ubuntu.com/usn/USN-3000-1 http://www.ubuntu.com/usn/USN-3001-1 http://www.ubuntu.com/usn/USN-3002-1 http://www.ubuntu.com/usn/USN-3003-1 http://www.ubuntu.com/usn/USN-3004-1 http://www.ubuntu.com/usn/USN-3021-1 http://www.ubuntu.com/usn/USN-3021-2 https://access.redhat.com/security/cve/CVE-2016-3951 https://bugzilla.novell.com/show_bug.cgi?id=974418 https://bugzilla.redhat.com/show_bug.cgi?id=1324782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1666984c8625b3db19a9abc298931d35ab7bc64b https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4d06dd537f95683aba3651098ae288b7cbff8274 https://github.com/torvalds/linux/commit/1666984c8625b3db19a9abc298931d35ab7bc64b https://github.com/torvalds/linux/commit/4d06dd537f95683aba3651098ae288b7cbff8274 https://linux.oracle.com/cve/CVE-2016-3951.html https://linux.oracle.com/errata/ELSA-2017-3533.html https://ubuntu.com/security/notices/USN-2965-1 https://ubuntu.com/security/notices/USN-2965-2 https://ubuntu.com/security/notices/USN-2965-3 https://ubuntu.com/security/notices/USN-2965-4 https://ubuntu.com/security/notices/USN-2989-1 https://ubuntu.com/security/notices/USN-2998-1 https://ubuntu.com/security/notices/USN-3000-1 https://ubuntu.com/security/notices/USN-3001-1 https://ubuntu.com/security/notices/USN-3002-1 https://ubuntu.com/security/notices/USN-3003-1 https://ubuntu.com/security/notices/USN-3004-1 https://ubuntu.com/security/notices/USN-3021-1 https://ubuntu.com/security/notices/USN-3021-2 https://www.spinics.net/lists/netdev/msg367669.html
|
| kernel-headers | CVE-2016-4482 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=681fef8380eb818c0b845fca5d2ab1dcbab114ee http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184414.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html http://www.debian.org/security/2016/dsa-3607 http://www.openwall.com/lists/oss-security/2016/05/04/2 http://www.openwall.com/lists/oss-security/2016/05/04/6 http://www.securityfocus.com/bid/90029 http://www.spinics.net/lists/linux-usb/msg140243.html http://www.ubuntu.com/usn/USN-3016-1 http://www.ubuntu.com/usn/USN-3016-2 http://www.ubuntu.com/usn/USN-3016-3 http://www.ubuntu.com/usn/USN-3016-4 http://www.ubuntu.com/usn/USN-3017-1 http://www.ubuntu.com/usn/USN-3017-2 http://www.ubuntu.com/usn/USN-3017-3 http://www.ubuntu.com/usn/USN-3018-1 http://www.ubuntu.com/usn/USN-3018-2 http://www.ubuntu.com/usn/USN-3019-1 http://www.ubuntu.com/usn/USN-3020-1 http://www.ubuntu.com/usn/USN-3021-1 http://www.ubuntu.com/usn/USN-3021-2 https://access.redhat.com/security/cve/CVE-2016-4482 https://bugzilla.redhat.com/show_bug.cgi?id=1332931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482 https://git.kernel.org/cgit/linux/kernel/git/gregkh/usb.git/commit/?h=usb-next&id=681fef8380eb818c0b845fca5d2ab1dcbab114ee https://github.com/torvalds/linux/commit/681fef8380eb818c0b845fca5d2ab1dcbab114ee https://linux.oracle.com/cve/CVE-2016-4482.html https://linux.oracle.com/errata/ELSA-2017-3516.html https://ubuntu.com/security/notices/USN-3016-1 https://ubuntu.com/security/notices/USN-3016-2 https://ubuntu.com/security/notices/USN-3016-3 https://ubuntu.com/security/notices/USN-3016-4 https://ubuntu.com/security/notices/USN-3017-1 https://ubuntu.com/security/notices/USN-3017-2 https://ubuntu.com/security/notices/USN-3017-3 https://ubuntu.com/security/notices/USN-3018-1 https://ubuntu.com/security/notices/USN-3018-2 https://ubuntu.com/security/notices/USN-3019-1 https://ubuntu.com/security/notices/USN-3020-1 https://ubuntu.com/security/notices/USN-3021-1 https://ubuntu.com/security/notices/USN-3021-2
|
| kernel-headers | CVE-2016-4486 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6 http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 http://www.openwall.com/lists/oss-security/2016/05/04/27 http://www.openwall.com/lists/oss-security/2016/05/05/2 http://www.securityfocus.com/bid/90051 http://www.ubuntu.com/usn/USN-2989-1 http://www.ubuntu.com/usn/USN-2996-1 http://www.ubuntu.com/usn/USN-2997-1 http://www.ubuntu.com/usn/USN-2998-1 http://www.ubuntu.com/usn/USN-3000-1 http://www.ubuntu.com/usn/USN-3001-1 http://www.ubuntu.com/usn/USN-3002-1 http://www.ubuntu.com/usn/USN-3003-1 http://www.ubuntu.com/usn/USN-3004-1 http://www.ubuntu.com/usn/USN-3005-1 http://www.ubuntu.com/usn/USN-3006-1 http://www.ubuntu.com/usn/USN-3007-1 https://access.redhat.com/security/cve/CVE-2016-4486 https://bugzilla.redhat.com/show_bug.cgi?id=1333316 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486 https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=5f8e44741f9f216e33736ea4ec65ca9ac03036e6 https://github.com/torvalds/linux/commit/5f8e44741f9f216e33736ea4ec65ca9ac03036e6 https://ubuntu.com/security/notices/USN-2989-1 https://ubuntu.com/security/notices/USN-2996-1 https://ubuntu.com/security/notices/USN-2997-1 https://ubuntu.com/security/notices/USN-2998-1 https://ubuntu.com/security/notices/USN-3000-1 https://ubuntu.com/security/notices/USN-3001-1 https://ubuntu.com/security/notices/USN-3002-1 https://ubuntu.com/security/notices/USN-3003-1 https://ubuntu.com/security/notices/USN-3004-1 https://ubuntu.com/security/notices/USN-3005-1 https://ubuntu.com/security/notices/USN-3006-1 https://ubuntu.com/security/notices/USN-3007-1 https://www.exploit-db.com/exploits/46006/
|
| kernel-headers | CVE-2016-4580 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=79e48650320e6fba48369fccf13fd045315b19b8 http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.5 http://www.openwall.com/lists/oss-security/2016/05/10/12 http://www.securityfocus.com/bid/90528 http://www.ubuntu.com/usn/USN-3016-1 http://www.ubuntu.com/usn/USN-3016-2 http://www.ubuntu.com/usn/USN-3016-3 http://www.ubuntu.com/usn/USN-3016-4 http://www.ubuntu.com/usn/USN-3017-1 http://www.ubuntu.com/usn/USN-3017-2 http://www.ubuntu.com/usn/USN-3017-3 http://www.ubuntu.com/usn/USN-3018-1 http://www.ubuntu.com/usn/USN-3018-2 http://www.ubuntu.com/usn/USN-3019-1 http://www.ubuntu.com/usn/USN-3020-1 http://www.ubuntu.com/usn/USN-3021-1 http://www.ubuntu.com/usn/USN-3021-2 https://access.redhat.com/security/cve/CVE-2016-4580 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580 https://github.com/torvalds/linux/commit/79e48650320e6fba48369fccf13fd045315b19b8 https://linux.oracle.com/cve/CVE-2016-4580.html https://linux.oracle.com/errata/ELSA-2017-3535.html https://ubuntu.com/security/notices/USN-3016-1 https://ubuntu.com/security/notices/USN-3016-2 https://ubuntu.com/security/notices/USN-3016-3 https://ubuntu.com/security/notices/USN-3016-4 https://ubuntu.com/security/notices/USN-3017-1 https://ubuntu.com/security/notices/USN-3017-2 https://ubuntu.com/security/notices/USN-3017-3 https://ubuntu.com/security/notices/USN-3018-1 https://ubuntu.com/security/notices/USN-3018-2 https://ubuntu.com/security/notices/USN-3019-1 https://ubuntu.com/security/notices/USN-3020-1 https://ubuntu.com/security/notices/USN-3021-1 https://ubuntu.com/security/notices/USN-3021-2
|
| kernel-headers | CVE-2016-4805 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1f461dcdd296eecedaffffc6bae2bfa90bd7eb89 http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html http://seclists.org/oss-sec/2016/q2/346 http://www.debian.org/security/2016/dsa-3607 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.2 http://www.openwall.com/lists/oss-security/2016/05/15/2 http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/bid/90605 http://www.securitytracker.com/id/1036763 http://www.ubuntu.com/usn/USN-3021-1 http://www.ubuntu.com/usn/USN-3021-2 https://access.redhat.com/security/cve/CVE-2016-4805 https://bugzilla.redhat.com/show_bug.cgi?id=1335803 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805 https://github.com/torvalds/linux/commit/1f461dcdd296eecedaffffc6bae2bfa90bd7eb89 https://linux.oracle.com/cve/CVE-2016-4805.html https://linux.oracle.com/errata/ELSA-2016-3596.html https://ubuntu.com/security/notices/USN-3021-1 https://ubuntu.com/security/notices/USN-3021-2
|
| kernel-headers | CVE-2016-6130 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=532c34b5fbf1687df63b3fcd5b2846312ac943c6 http://www.debian.org/security/2016/dsa-3616 http://www.securityfocus.com/archive/1/538803/30/0/threaded http://www.securityfocus.com/bid/91540 https://access.redhat.com/security/cve/CVE-2016-6130 https://bugzilla.kernel.org/show_bug.cgi?id=116741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6130 https://github.com/torvalds/linux/commit/532c34b5fbf1687df63b3fcd5b2846312ac943c6 https://ubuntu.com/security/notices/USN-3099-1
|
| kernel-headers | CVE-2016-7425 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7bc2b55a5c030685b399bb65b6baa9ccc3d1f167 http://marc.info/?l=linux-scsi&m=147394713328707&w=2 http://marc.info/?l=linux-scsi&m=147394796228991&w=2 http://www.openwall.com/lists/oss-security/2016/09/17/2 http://www.securityfocus.com/bid/93037 http://www.ubuntu.com/usn/USN-3144-1 http://www.ubuntu.com/usn/USN-3144-2 http://www.ubuntu.com/usn/USN-3145-1 http://www.ubuntu.com/usn/USN-3145-2 http://www.ubuntu.com/usn/USN-3146-1 http://www.ubuntu.com/usn/USN-3146-2 http://www.ubuntu.com/usn/USN-3147-1 https://access.redhat.com/security/cve/CVE-2016-7425 https://bugzilla.redhat.com/show_bug.cgi?id=1377330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425 https://github.com/torvalds/linux/commit/7bc2b55a5c030685b399bb65b6baa9ccc3d1f167 https://linux.oracle.com/cve/CVE-2016-7425.html https://linux.oracle.com/errata/ELSA-2017-3535.html https://security-tracker.debian.org/tracker/CVE-2016-7425 https://ubuntu.com/security/notices/USN-3144-1 https://ubuntu.com/security/notices/USN-3144-2 https://ubuntu.com/security/notices/USN-3145-1 https://ubuntu.com/security/notices/USN-3145-2 https://ubuntu.com/security/notices/USN-3146-1 https://ubuntu.com/security/notices/USN-3146-2 https://ubuntu.com/security/notices/USN-3147-1 https://ubuntu.com/security/notices/USN-3161-3 https://ubuntu.com/security/notices/USN-3161-4 https://ubuntu.com/security/notices/USN-3162-2
|
| kernel-headers | CVE-2016-7916 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8148a73c9901a8794a50f950083c00ccf97d43b3 http://source.android.com/security/bulletin/2016-11-01.html http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.4 http://www.securityfocus.com/bid/94138 http://www.ubuntu.com/usn/USN-3159-1 http://www.ubuntu.com/usn/USN-3159-2 https://access.redhat.com/security/cve/CVE-2016-7916 https://bugzilla.kernel.org/show_bug.cgi?id=116461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916 https://forums.grsecurity.net/viewtopic.php?f=3&t=4363 https://github.com/torvalds/linux/commit/8148a73c9901a8794a50f950083c00ccf97d43b3 https://ubuntu.com/security/notices/USN-3159-1 https://ubuntu.com/security/notices/USN-3159-2 https://ubuntu.com/security/notices/USN-3160-1 https://ubuntu.com/security/notices/USN-3160-2
|
| kernel-headers | CVE-2016-8405 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.debian.org/security/2017/dsa-3791 http://www.securityfocus.com/bid/94686 https://access.redhat.com/security/cve/CVE-2016-8405 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405 https://marc.info/?l=linux-kernel&m=148365805203921&w=2 https://source.android.com/security/bulletin/2016-12-01.html https://ubuntu.com/security/notices/USN-3361-1 https://ubuntu.com/security/notices/USN-3381-1 https://ubuntu.com/security/notices/USN-3381-2
|
| kernel-headers | CVE-2016-8658 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ded89912156b1a47d940a0c954c43afbabd0c42c http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5 http://www.openwall.com/lists/oss-security/2016/10/13/1 http://www.securityfocus.com/bid/93541 http://www.ubuntu.com/usn/USN-3145-1 http://www.ubuntu.com/usn/USN-3145-2 http://www.ubuntu.com/usn/USN-3146-1 http://www.ubuntu.com/usn/USN-3146-2 https://access.redhat.com/security/cve/CVE-2016-8658 https://bugzilla.redhat.com/show_bug.cgi?id=1384403 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658 https://github.com/torvalds/linux/commit/ded89912156b1a47d940a0c954c43afbabd0c42c https://ubuntu.com/security/notices/USN-3145-1 https://ubuntu.com/security/notices/USN-3145-2 https://ubuntu.com/security/notices/USN-3146-1 https://ubuntu.com/security/notices/USN-3146-2 https://ubuntu.com/security/notices/USN-3161-3 https://ubuntu.com/security/notices/USN-3161-4
|
| kernel-headers | CVE-2016-9178 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1c109fabbd51863475cd12ac206bdd249aee35af http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.7.5 http://www.openwall.com/lists/oss-security/2016/11/03/2 http://www.openwall.com/lists/oss-security/2016/11/04/4 http://www.securityfocus.com/bid/94144 https://access.redhat.com/security/cve/CVE-2016-9178 https://bugzilla.redhat.com/show_bug.cgi?id=1391908 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9178 https://github.com/torvalds/linux/commit/1c109fabbd51863475cd12ac206bdd249aee35af https://linux.oracle.com/cve/CVE-2016-9178.html https://linux.oracle.com/errata/ELSA-2017-3534.html https://ubuntu.com/security/notices/USN-3161-3 https://ubuntu.com/security/notices/USN-3422-1 https://ubuntu.com/security/notices/USN-3422-2
|
| kernel-headers | CVE-2016-9756 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2117d5398c81554fbf803f5fd1dc55eb78216c0c http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00000.html http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.12 http://www.openwall.com/lists/oss-security/2016/12/01/1 http://www.securityfocus.com/bid/94615 https://access.redhat.com/security/cve/CVE-2016-9756 https://bugzilla.redhat.com/show_bug.cgi?id=1400468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9756 https://github.com/torvalds/linux/commit/2117d5398c81554fbf803f5fd1dc55eb78216c0c https://linux.oracle.com/cve/CVE-2016-9756.html https://linux.oracle.com/errata/ELSA-2017-3533.html https://ubuntu.com/security/notices/USN-3167-1 https://ubuntu.com/security/notices/USN-3167-2 https://ubuntu.com/security/notices/USN-3168-1 https://ubuntu.com/security/notices/USN-3168-2 https://ubuntu.com/security/notices/USN-3169-1 https://ubuntu.com/security/notices/USN-3169-2 https://ubuntu.com/security/notices/USN-3170-1
|
| kernel-headers | CVE-2017-0627 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/98205 https://access.redhat.com/security/cve/CVE-2017-0627 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0627 https://github.com/LineageOS/android_kernel_lge_g3/commit/f85c1738998cdbd67e158e1f3b2af8f7c62a269e https://source.android.com/security/bulletin/2017-05-01 https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-uvc-driver https://ubuntu.com/security/notices/USN-3674-1 https://ubuntu.com/security/notices/USN-3674-2 https://usn.ubuntu.com/3674-1/ https://usn.ubuntu.com/3674-2/
|
| kernel-headers | CVE-2017-0630 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/98213 https://access.redhat.com/security/cve/CVE-2017-0630 https://source.android.com/security/bulletin/2017-05-01 https://source.android.com/security/bulletin/2017-05-01#id-in-kernel-trace-subsystem
|
| kernel-headers | CVE-2017-1000365 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.securityfocus.com/bid/99156 https://access.redhat.com/security/cve/CVE-2017-1000365 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000365 https://linux.oracle.com/cve/CVE-2017-1000365.html https://linux.oracle.com/errata/ELSA-2017-3622.html https://patchwork.kernel.org/patch/9803203/ https://ubuntu.com/security/notices/USN-3377-1 https://ubuntu.com/security/notices/USN-3377-2 https://ubuntu.com/security/notices/USN-3378-1 https://ubuntu.com/security/notices/USN-3378-2 https://ubuntu.com/security/notices/USN-3381-1 https://ubuntu.com/security/notices/USN-3381-2 https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
| kernel-headers | CVE-2017-1000371 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/99131 https://access.redhat.com/security/cve/CVE-2017-1000371 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000371 https://linux.oracle.com/cve/CVE-2017-1000371.html https://linux.oracle.com/errata/ELSA-2020-1524.html https://www.exploit-db.com/exploits/42273/ https://www.exploit-db.com/exploits/42276/ https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
|
| kernel-headers | CVE-2017-10810 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=385aee965b4e4c36551c362a334378d2985b722a http://www.debian.org/security/2017/dsa-3927 http://www.securityfocus.com/bid/99433 https://access.redhat.com/security/cve/CVE-2017-10810 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10810 https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a https://lkml.org/lkml/2017/4/6/668 https://ubuntu.com/security/notices/USN-3377-1 https://ubuntu.com/security/notices/USN-3377-2 https://ubuntu.com/security/notices/USN-3378-1 https://ubuntu.com/security/notices/USN-3378-2
|
| kernel-headers | CVE-2017-11473 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/100010 https://access.redhat.com/errata/RHSA-2018:0654 https://access.redhat.com/security/cve/CVE-2017-11473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11473 https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=70ac67826602edf8c0ccb413e5ba7eacf597a60c https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=96301209473afd3f2f274b91cb7082d161b9be65 https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=dad5ab0db8deac535d03e3fe3d8f2892173fa6a4 https://linux.oracle.com/cve/CVE-2017-11473.html https://linux.oracle.com/errata/ELSA-2017-3637.html https://source.android.com/security/bulletin/pixel/2018-01-01 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-12153 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://seclists.org/oss-sec/2017/q3/437 http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100855 https://access.redhat.com/security/cve/CVE-2017-12153 https://bugzilla.novell.com/show_bug.cgi?id=1058410 https://bugzilla.redhat.com/show_bug.cgi?id=1491046 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12153 https://git.kernel.org/pub/scm/linux/kernel/git/jberg/mac80211.git/commit/?id=e785fa0a164aa11001cba931367c7f94ffaff888 https://linux.oracle.com/cve/CVE-2017-12153.html https://linux.oracle.com/errata/ELSA-2019-4531.html https://marc.info/?l=linux-wireless&m=150525493517953&w=2 https://marc.info/?t=150525503100001&r=1&w=2 https://ubuntu.com/security/notices/USN-3469-1 https://ubuntu.com/security/notices/USN-3469-2 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/
|
| kernel-headers | CVE-2017-12762 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://seclists.org/oss-sec/2017/q3/274 http://www.openwall.com/lists/oss-security/2020/02/11/1 http://www.openwall.com/lists/oss-security/2020/02/11/2 http://www.openwall.com/lists/oss-security/2020/02/14/4 http://www.securityfocus.com/bid/100251 https://access.redhat.com/security/cve/CVE-2017-12762 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12762 https://patchwork.kernel.org/patch/9880041/ https://ubuntu.com/security/notices/USN-3420-1 https://ubuntu.com/security/notices/USN-3420-2 https://ubuntu.com/security/notices/USN-3620-1 https://ubuntu.com/security/notices/USN-3620-2 https://usn.ubuntu.com/3620-1/ https://usn.ubuntu.com/3620-2/
|
| kernel-headers | CVE-2017-14140 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9 http://www.debian.org/security/2017/dsa-3981 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9 http://www.securityfocus.com/bid/100876 https://access.redhat.com/errata/RHSA-2018:0676 https://access.redhat.com/errata/RHSA-2018:1062 https://access.redhat.com/security/cve/CVE-2017-14140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140 https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9 https://linux.oracle.com/cve/CVE-2017-14140.html https://linux.oracle.com/errata/ELSA-2018-4025.html https://source.android.com/security/bulletin/pixel/2018-01-01 https://ubuntu.com/security/notices/USN-3444-1 https://ubuntu.com/security/notices/USN-3444-2 https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/
|
| kernel-headers | CVE-2017-15115 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html http://seclists.org/oss-sec/2017/q4/282 http://www.securityfocus.com/bid/101877 https://access.redhat.com/security/cve/CVE-2017-15115 https://bugzilla.redhat.com/show_bug.cgi?id=1513345 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115 https://git.kernel.org/linus/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 https://linux.oracle.com/cve/CVE-2017-15115.html https://linux.oracle.com/errata/ELSA-2018-4025.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://patchwork.ozlabs.org/patch/827077/ https://source.android.com/security/bulletin/pixel/2018-04-01 https://ubuntu.com/security/notices/USN-3581-1 https://ubuntu.com/security/notices/USN-3581-2 https://ubuntu.com/security/notices/USN-3581-3 https://ubuntu.com/security/notices/USN-3582-1 https://ubuntu.com/security/notices/USN-3582-2 https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://usn.ubuntu.com/3581-1/ https://usn.ubuntu.com/3581-2/ https://usn.ubuntu.com/3581-3/ https://usn.ubuntu.com/3582-1/ https://usn.ubuntu.com/3582-2/ https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/
|
| kernel-headers | CVE-2017-16525 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/102028 https://access.redhat.com/security/cve/CVE-2017-16525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16525 https://github.com/torvalds/linux/commit/299d7572e46f98534033a9e65973f13ad1ce9047 https://github.com/torvalds/linux/commit/bd998c2e0df0469707503023d50d46cf0b10c787 https://groups.google.com/d/msg/syzkaller/cMACrmo1x0k/4KhRoUgABAAJ https://linux.oracle.com/cve/CVE-2017-16525.html https://linux.oracle.com/errata/ELSA-2018-4041.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/
|
| kernel-headers | CVE-2017-16526 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16526 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16526 https://github.com/torvalds/linux/commit/bbf26183b7a6236ba602f4d6a2f7cade35bba043 https://groups.google.com/d/msg/syzkaller/zROBxKXzHDk/5I6aZ3O2AgAJ https://linux.oracle.com/cve/CVE-2017-16526.html https://linux.oracle.com/errata/ELSA-2018-4040.html https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/ https://www.debian.org/security/2018/dsa-4187
|
| kernel-headers | CVE-2017-16527 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16527 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16527 https://github.com/torvalds/linux/commit/124751d5e63c823092060074bd0abaae61aaa9c4 https://groups.google.com/d/msg/syzkaller/jf7GTr_g2CU/iVlLhMciCQAJ https://linux.oracle.com/cve/CVE-2017-16527.html https://linux.oracle.com/errata/ELSA-2017-3651.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16529 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/103284 https://access.redhat.com/security/cve/CVE-2017-16529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16529 https://github.com/torvalds/linux/commit/bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991 https://groups.google.com/d/msg/syzkaller/rDzv5RP_f2M/M5au06qmAwAJ https://linux.oracle.com/cve/CVE-2017-16529.html https://linux.oracle.com/errata/ELSA-2018-4041.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16530 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16530 https://github.com/torvalds/linux/commit/786de92b3cb26012d3d0f00ee37adf14527f35c4 https://groups.google.com/d/msg/syzkaller/pCswO77gRlM/VHuPOftgAwAJ https://linux.oracle.com/cve/CVE-2017-16530.html https://linux.oracle.com/errata/ELSA-2018-4001.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1
|
| kernel-headers | CVE-2017-16531 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/102025 https://access.redhat.com/security/cve/CVE-2017-16531 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16531 https://github.com/torvalds/linux/commit/bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb https://groups.google.com/d/msg/syzkaller/hP6L-m59m_8/Co2ouWeFAwAJ https://linux.oracle.com/cve/CVE-2017-16531.html https://linux.oracle.com/errata/ELSA-2018-4041.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/ https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| kernel-headers | CVE-2017-16532 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16532 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16532 https://github.com/torvalds/linux/commit/7c80f9e4a588f1925b07134bb2e3689335f6c6d8 https://groups.google.com/d/msg/syzkaller/l3870gs3LhA/y79DYQdFBAAJ https://linux.oracle.com/cve/CVE-2017-16532.html https://linux.oracle.com/errata/ELSA-2018-4110.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16533 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/102026 https://access.redhat.com/security/cve/CVE-2017-16533 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16533 https://github.com/torvalds/linux/commit/f043bfc98c193c284e2cd768fefabe18ac2fed9b https://groups.google.com/d/msg/syzkaller/CxkJ9QZgwlM/O3IOvAaGAwAJ https://linux.oracle.com/cve/CVE-2017-16533.html https://linux.oracle.com/errata/ELSA-2018-4001.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16534 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html https://access.redhat.com/security/cve/CVE-2017-16534 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16534 https://github.com/torvalds/linux/commit/2e1c42391ff2556387b3cb6308b24f6f65619feb https://groups.google.com/d/msg/syzkaller/nXnjqI73uPo/6sUyq6kqAgAJ https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3487-1
|
| kernel-headers | CVE-2017-16535 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/102022 https://access.redhat.com/security/cve/CVE-2017-16535 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16535 https://github.com/torvalds/linux/commit/1c0edc3633b56000e18d82fc241e3995ca18a69e https://groups.google.com/d/msg/syzkaller/tzdz2fTB1K0/OvjIgLSTAgAJ https://linux.oracle.com/cve/CVE-2017-16535.html https://linux.oracle.com/errata/ELSA-2018-4040.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3485-1 https://ubuntu.com/security/notices/USN-3485-2 https://ubuntu.com/security/notices/USN-3485-3 https://ubuntu.com/security/notices/USN-3507-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16536 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16536 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16536 https://groups.google.com/d/msg/syzkaller/WlUAVfDvpRk/1V1xuEA4AgAJ https://linux.oracle.com/cve/CVE-2017-16536.html https://linux.oracle.com/errata/ELSA-2018-4001.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://patchwork.kernel.org/patch/9963527/ https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16537 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16537 https://groups.google.com/d/msg/syzkaller/bBFN8imrjjo/-5jCl8EiCQAJ https://linux.oracle.com/cve/CVE-2017-16537.html https://linux.oracle.com/errata/ELSA-2018-4110.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://patchwork.kernel.org/patch/9994017/ https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16538 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html https://access.redhat.com/security/cve/CVE-2017-16538 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16538 https://git.linuxtv.org/media_tree.git/commit/?id=3d932ee27e852e4904647f15b64dedca51187ad7 https://git.linuxtv.org/media_tree.git/commit/?id=7bf7a7116ed313c601307f7e585419369926ab05 https://groups.google.com/d/msg/syzkaller/XwNidsl4X04/ti6I2IaRBAAJ https://linux.oracle.com/cve/CVE-2017-16538.html https://linux.oracle.com/errata/ELSA-2020-5750.html https://patchwork.linuxtv.org/patch/44566/ https://patchwork.linuxtv.org/patch/44567/ https://ubuntu.com/security/notices/USN-3631-1 https://ubuntu.com/security/notices/USN-3631-2 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3631-1/ https://usn.ubuntu.com/3631-2/ https://usn.ubuntu.com/3754-1/ https://www.debian.org/security/2017/dsa-4073 https://www.debian.org/security/2018/dsa-4082
|
| kernel-headers | CVE-2017-16643 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.13.11 http://www.securityfocus.com/bid/101769 https://access.redhat.com/security/cve/CVE-2017-16643 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16643 https://github.com/torvalds/linux/commit/a50829479f58416a013a4ccca791336af3c584c7 https://groups.google.com/d/msg/syzkaller/McWFcOsA47Y/3bjtBBgaBAAJ https://linux.oracle.com/cve/CVE-2017-16643.html https://linux.oracle.com/errata/ELSA-2018-4110.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3507-1 https://ubuntu.com/security/notices/USN-3509-1 https://ubuntu.com/security/notices/USN-3509-2 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-16644 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/101842 https://access.redhat.com/security/cve/CVE-2017-16644 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16644 https://git.linuxtv.org/media_tree.git/commit/?id=c0f71bbb810237a38734607ca4599632f7f5d47f https://groups.google.com/d/msg/syzkaller/ngC5SLvxPm4/gduhCARhAwAJ https://linux.oracle.com/cve/CVE-2017-16644.html https://linux.oracle.com/errata/ELSA-2020-5837.html https://patchwork.kernel.org/patch/9966135/ https://ubuntu.com/security/notices/USN-3754-1 https://ubuntu.com/security/notices/USN-4904-1 https://usn.ubuntu.com/3754-1/ https://www.debian.org/security/2017/dsa-4073
|
| kernel-headers | CVE-2017-16646 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/101846 https://access.redhat.com/security/cve/CVE-2017-16646 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16646 https://groups.google.com/d/msg/syzkaller/-d6ilzbVu_g/OBy8_62mAwAJ https://linux.oracle.com/cve/CVE-2017-16646.html https://linux.oracle.com/errata/ELSA-2018-4071.html https://patchwork.linuxtv.org/patch/45291/ https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/
|
| kernel-headers | CVE-2017-16647 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/101767 https://access.redhat.com/security/cve/CVE-2017-16647 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16647 https://groups.google.com/d/msg/syzkaller/_9a6pd-p_0E/OnmnplQuAgAJ https://patchwork.ozlabs.org/patch/834686/ https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/
|
| kernel-headers | CVE-2017-16649 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/101761 https://access.redhat.com/security/cve/CVE-2017-16649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16649 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=2cb80187ba065d7decad7c6614e35e07aec8a974 https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://patchwork.ozlabs.org/patch/834771/ https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3822-1 https://ubuntu.com/security/notices/USN-3822-2 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3822-1/ https://usn.ubuntu.com/3822-2/
|
| kernel-headers | CVE-2017-16650 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/101791 https://access.redhat.com/security/cve/CVE-2017-16650 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16650 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7fd078337201cf7468f53c3d9ef81ff78cb6df3b https://groups.google.com/d/msg/syzkaller/0e0gmaX9R0g/9Me9JcY2BQAJ https://linux.oracle.com/cve/CVE-2017-16650.html https://linux.oracle.com/errata/ELSA-2019-4644.html https://patchwork.ozlabs.org/patch/834770/ https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-17450 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html http://www.securityfocus.com/bid/102110 https://access.redhat.com/security/cve/CVE-2017-17450 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17450 https://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git/commit/?id=916a27901de01446bcf57ecca4783f6cff493309 https://linux.oracle.com/cve/CVE-2017-17450.html https://linux.oracle.com/errata/ELSA-2019-4317.html https://lkml.org/lkml/2017/12/5/982 https://ubuntu.com/security/notices/USN-3583-1 https://ubuntu.com/security/notices/USN-3583-2 https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3632-1 https://usn.ubuntu.com/3583-1/ https://usn.ubuntu.com/3583-2/ https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3632-1/ https://www.debian.org/security/2017/dsa-4073 https://www.debian.org/security/2018/dsa-4082
|
| kernel-headers | CVE-2017-17741 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/102227 https://access.redhat.com/security/cve/CVE-2017-17741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17741 https://linux.oracle.com/cve/CVE-2017-17741.html https://linux.oracle.com/errata/ELSA-2018-4172.html https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html https://ubuntu.com/security/notices/USN-3617-1 https://ubuntu.com/security/notices/USN-3617-2 https://ubuntu.com/security/notices/USN-3617-3 https://ubuntu.com/security/notices/USN-3619-1 https://ubuntu.com/security/notices/USN-3619-2 https://ubuntu.com/security/notices/USN-3620-1 https://ubuntu.com/security/notices/USN-3620-2 https://ubuntu.com/security/notices/USN-3632-1 https://usn.ubuntu.com/3617-1/ https://usn.ubuntu.com/3617-2/ https://usn.ubuntu.com/3617-3/ https://usn.ubuntu.com/3619-1/ https://usn.ubuntu.com/3619-2/ https://usn.ubuntu.com/3620-1/ https://usn.ubuntu.com/3620-2/ https://usn.ubuntu.com/3632-1/ https://www.debian.org/security/2017/dsa-4073 https://www.debian.org/security/2018/dsa-4082 https://www.spinics.net/lists/kvm/msg160710.html https://www.spinics.net/lists/kvm/msg160796.html
|
| kernel-headers | CVE-2017-5549 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=146cc8a17a3b4996f6805ee5c080e7101277c410 http://seclists.org/oss-sec/2017/q1/161 http://www.debian.org/security/2017/dsa-3791 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.5 http://www.openwall.com/lists/oss-security/2017/01/21/3 http://www.securityfocus.com/bid/95715 https://access.redhat.com/security/cve/CVE-2017-5549 https://bugzilla.redhat.com/show_bug.cgi?id=1416114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549 https://github.com/torvalds/linux/commit/146cc8a17a3b4996f6805ee5c080e7101277c410 https://ubuntu.com/security/notices/USN-3208-1 https://ubuntu.com/security/notices/USN-3208-2 https://ubuntu.com/security/notices/USN-3361-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-5897 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.debian.org/security/2017/dsa-3791 http://www.openwall.com/lists/oss-security/2017/02/07/2 http://www.securityfocus.com/bid/96037 http://www.securitytracker.com/id/1037794 https://access.redhat.com/security/cve/CVE-2017-5897 https://bugzilla.redhat.com/show_bug.cgi?id=1419848 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897 https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=7892032cfe67f4bde6fc2ee967e45a8fbaf33756 https://linux.oracle.com/cve/CVE-2017-5897.html https://linux.oracle.com/errata/ELSA-2017-3533.html https://source.android.com/security/bulletin/2017-09-01 https://ubuntu.com/security/notices/USN-3265-1 https://ubuntu.com/security/notices/USN-3265-2 https://ubuntu.com/security/notices/USN-3361-1 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-5967 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=dfb4357da6ddbdf57d583ba64361c9d792b0e0b1 http://www.securityfocus.com/bid/96271 https://access.redhat.com/security/cve/CVE-2017-5967 https://bugzilla.kernel.org/show_bug.cgi?id=193921 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5967 https://ubuntu.com/security/notices/USN-4904-1
|
| kernel-headers | CVE-2017-7261 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://marc.info/?t=149037004200005&r=1&w=2 http://www.securityfocus.com/bid/97096 https://access.redhat.com/security/cve/CVE-2017-7261 https://bugzilla.redhat.com/show_bug.cgi?id=1435719 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7261 https://linux.oracle.com/cve/CVE-2017-7261.html https://linux.oracle.com/errata/ELSA-2020-5671.html https://lists.freedesktop.org/archives/dri-devel/2017-March/136814.html https://ubuntu.com/security/notices/USN-3291-1 https://ubuntu.com/security/notices/USN-3291-2 https://ubuntu.com/security/notices/USN-3291-3 https://ubuntu.com/security/notices/USN-3293-1 https://ubuntu.com/security/notices/USN-3361-1 https://ubuntu.com/security/notices/USN-3406-1 https://ubuntu.com/security/notices/USN-3406-2
|
| kernel-headers | CVE-2017-7273 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1ebb71143758f45dc0fa76e2f48429e13b16d110 http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4faec4a2ef5dd481682cc155cb9ea14ba2534b76 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.4 http://www.securityfocus.com/bid/97190 https://access.redhat.com/security/cve/CVE-2017-7273 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7273 https://github.com/torvalds/linux/commit/1ebb71143758f45dc0fa76e2f48429e13b16d110 https://linux.oracle.com/cve/CVE-2017-7273.html https://linux.oracle.com/errata/ELSA-2017-3597.html https://ubuntu.com/security/notices/USN-3361-1 https://ubuntu.com/security/notices/USN-3406-1 https://ubuntu.com/security/notices/USN-3406-2
|
| kernel-headers | CVE-2017-7346 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://marc.info/?l=linux-kernel&m=149086968410117&w=2 http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.openwall.com/lists/oss-security/2017/03/29/1 http://www.securityfocus.com/bid/97257 https://access.redhat.com/security/cve/CVE-2017-7346 https://bugzilla.redhat.com/show_bug.cgi?id=1437431 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7346 https://github.com/torvalds/linux/commit/ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf https://linux.oracle.com/cve/CVE-2017-7346.html https://linux.oracle.com/errata/ELSA-2020-5670.html https://lists.freedesktop.org/archives/dri-devel/2017-March/137429.html https://ubuntu.com/security/notices/USN-3358-1 https://ubuntu.com/security/notices/USN-3359-1 https://ubuntu.com/security/notices/USN-3360-1 https://ubuntu.com/security/notices/USN-3360-2 https://ubuntu.com/security/notices/USN-3364-1 https://ubuntu.com/security/notices/USN-3364-2 https://ubuntu.com/security/notices/USN-3364-3 https://ubuntu.com/security/notices/USN-3371-1
|
| kernel-headers | CVE-2017-8831 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/archive/1/540770/30/0/threaded http://www.securityfocus.com/bid/99619 https://access.redhat.com/security/cve/CVE-2017-8831 https://bugzilla.kernel.org/show_bug.cgi?id=195559 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8831 https://github.com/stoth68000/media-tree/commit/354dd3924a2e43806774953de536257548b5002c https://linux.oracle.com/cve/CVE-2017-8831.html https://linux.oracle.com/errata/ELSA-2017-3637.html https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://ubuntu.com/security/notices/USN-3420-1 https://ubuntu.com/security/notices/USN-3420-2 https://ubuntu.com/security/notices/USN-3754-1 https://usn.ubuntu.com/3754-1/
|
| kernel-headers | CVE-2017-8924 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=654b404f2a222f918af9b0cd18ad469d0c941a8e http://www.debian.org/security/2017/dsa-3886 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4 http://www.securityfocus.com/bid/98451 https://access.redhat.com/security/cve/CVE-2017-8924 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8924 https://github.com/torvalds/linux/commit/654b404f2a222f918af9b0cd18ad469d0c941a8e https://linux.oracle.com/cve/CVE-2017-8924.html https://linux.oracle.com/errata/ELSA-2020-5881.html https://ubuntu.com/security/notices/USN-3359-1 https://ubuntu.com/security/notices/USN-3360-1 https://ubuntu.com/security/notices/USN-3360-2 https://ubuntu.com/security/notices/USN-3361-1
|
| kernel-headers | CVE-2017-8925 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30572418b445d85fcfe6c8fe84c947d2606767d8 http://www.debian.org/security/2017/dsa-3886 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.10.4 http://www.securityfocus.com/bid/98462 https://access.redhat.com/security/cve/CVE-2017-8925 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8925 https://github.com/torvalds/linux/commit/30572418b445d85fcfe6c8fe84c947d2606767d8 https://linux.oracle.com/cve/CVE-2017-8925.html https://linux.oracle.com/errata/ELSA-2020-5936.html https://ubuntu.com/security/notices/USN-3359-1 https://ubuntu.com/security/notices/USN-3360-1 https://ubuntu.com/security/notices/USN-3360-2 https://ubuntu.com/security/notices/USN-3361-1
|
| kernel-headers | CVE-2017-9605 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07678eca2cf9c9a18584e546c2b2a0d0c9a3150c http://www.debian.org/security/2017/dsa-3927 http://www.debian.org/security/2017/dsa-3945 http://www.openwall.com/lists/oss-security/2017/06/13/2 http://www.securityfocus.com/bid/99095 https://access.redhat.com/security/cve/CVE-2017-9605 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9605 https://github.com/torvalds/linux/commit/07678eca2cf9c9a18584e546c2b2a0d0c9a3150c https://linux.oracle.com/cve/CVE-2017-9605.html https://linux.oracle.com/errata/ELSA-2020-5962.html https://ubuntu.com/security/notices/USN-3358-1 https://ubuntu.com/security/notices/USN-3359-1 https://ubuntu.com/security/notices/USN-3360-1 https://ubuntu.com/security/notices/USN-3360-2 https://ubuntu.com/security/notices/USN-3364-1 https://ubuntu.com/security/notices/USN-3364-2 https://ubuntu.com/security/notices/USN-3364-3 https://ubuntu.com/security/notices/USN-3371-1
|
| kernel-headers | CVE-2018-1108 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/104055 https://access.redhat.com/security/cve/CVE-2018-1108 https://bugs.chromium.org/p/project-zero/issues/detail?id=1559 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1108 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1108 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43838a23a05fbd13e47d750d3dfd77001536dd33 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ef35c866f8862df074a49a93b0309725812dea8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dc12baacb95f205948f64dc936a47d89ee110117 https://ubuntu.com/security/notices/USN-3752-1 https://ubuntu.com/security/notices/USN-3752-2 https://ubuntu.com/security/notices/USN-3752-3 https://usn.ubuntu.com/3718-1/ https://usn.ubuntu.com/3718-2/ https://usn.ubuntu.com/3752-1/ https://usn.ubuntu.com/3752-2/ https://usn.ubuntu.com/3752-3/ https://www.debian.org/security/2018/dsa-4188
|
| kernel-headers | CVE-2018-14609 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/104917 https://access.redhat.com/security/cve/CVE-2018-14609 https://bugzilla.kernel.org/show_bug.cgi?id=199833 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14609 https://linux.oracle.com/cve/CVE-2018-14609.html https://linux.oracle.com/errata/ELSA-2019-4570.html https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html https://patchwork.kernel.org/patch/10500521/ https://ubuntu.com/security/notices/USN-3821-1 https://ubuntu.com/security/notices/USN-3821-2 https://ubuntu.com/security/notices/USN-4094-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/3821-1/ https://usn.ubuntu.com/3821-2/ https://usn.ubuntu.com/4094-1/ https://usn.ubuntu.com/4118-1/ https://www.debian.org/security/2018/dsa-4308
|
| kernel-headers | CVE-2018-14612 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/104917 https://access.redhat.com/security/cve/CVE-2018-14612 https://bugzilla.kernel.org/show_bug.cgi?id=199847 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14612 https://linux.oracle.com/cve/CVE-2018-14612.html https://linux.oracle.com/errata/ELSA-2019-4570.html https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://patchwork.kernel.org/patch/10503403/ https://patchwork.kernel.org/patch/10503413/ https://ubuntu.com/security/notices/USN-3932-1 https://ubuntu.com/security/notices/USN-3932-2 https://ubuntu.com/security/notices/USN-4094-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/3932-1/ https://usn.ubuntu.com/3932-2/ https://usn.ubuntu.com/4094-1/ https://usn.ubuntu.com/4118-1/
|
| kernel-headers | CVE-2018-14613 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/104917 https://access.redhat.com/security/cve/CVE-2018-14613 https://bugzilla.kernel.org/show_bug.cgi?id=199849 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14613 https://linux.oracle.com/cve/CVE-2018-14613.html https://linux.oracle.com/errata/ELSA-2020-5845.html https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://patchwork.kernel.org/patch/10503147/ https://ubuntu.com/security/notices/USN-3932-1 https://ubuntu.com/security/notices/USN-3932-2 https://ubuntu.com/security/notices/USN-4094-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/3932-1/ https://usn.ubuntu.com/3932-2/ https://usn.ubuntu.com/4094-1/ https://usn.ubuntu.com/4118-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2018-18710 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 http://www.securityfocus.com/bid/106041 https://access.redhat.com/security/cve/CVE-2018-18710 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18710 https://git.kernel.org/linus/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 https://linux.oracle.com/cve/CVE-2018-18710.html https://linux.oracle.com/errata/ELSA-2019-4316.html https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html https://ubuntu.com/security/notices/USN-3846-1 https://ubuntu.com/security/notices/USN-3847-1 https://ubuntu.com/security/notices/USN-3847-2 https://ubuntu.com/security/notices/USN-3847-3 https://ubuntu.com/security/notices/USN-3848-1 https://ubuntu.com/security/notices/USN-3848-2 https://ubuntu.com/security/notices/USN-3849-1 https://ubuntu.com/security/notices/USN-3849-2 https://usn.ubuntu.com/3846-1/ https://usn.ubuntu.com/3847-1/ https://usn.ubuntu.com/3847-2/ https://usn.ubuntu.com/3847-3/ https://usn.ubuntu.com/3848-1/ https://usn.ubuntu.com/3848-2/ https://usn.ubuntu.com/3849-1/ https://usn.ubuntu.com/3849-2/
|
| kernel-headers | CVE-2018-19985 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/security/cve/CVE-2018-19985 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985 https://git.kernel.org/linus/5146f95df782b0ac61abde36567e718692725c89 https://hexhive.epfl.ch/projects/perifuzz/ https://linux.oracle.com/cve/CVE-2018-19985.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html https://seclists.org/bugtraq/2019/Jan/52 https://security.netapp.com/advisory/ntap-20190404-0002/ https://ubuntu.com/security/notices/USN-3910-1 https://ubuntu.com/security/notices/USN-3910-2 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/
|
| kernel-headers | CVE-2018-7273 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.securityfocus.com/bid/103088 https://access.redhat.com/security/cve/CVE-2018-7273 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7273 https://lkml.org/lkml/2018/2/20/669 https://www.exploit-db.com/exploits/44325/
|
| kernel-headers | CVE-2019-0136 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.18.2.el7 | Expand...http://jvn.jp/en/jp/JVN75617741/index.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html http://www.securityfocus.com/bid/108777 https://access.redhat.com/security/cve/CVE-2019-0136 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0136 https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://support.lenovo.com/us/en/product_security/LEN-27828 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4145-1 https://ubuntu.com/security/notices/USN-4147-1 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/ https://usn.ubuntu.com/4145-1/ https://usn.ubuntu.com/4147-1/ https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html
|
| kernel-headers | CVE-2019-10638 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.securityfocus.com/bid/109092 https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://access.redhat.com/security/cve/CVE-2019-10638 https://arxiv.org/pdf/1906.10478.pdf https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.7 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df453700e8d81b1bdafdf684365ee2b9431fb702 https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92 https://github.com/torvalds/linux/commit/55f0fc7a02de8f12757f4937143d8d5091b2e40b https://github.com/torvalds/linux/commit/df453700e8d81b1bdafdf684365ee2b9431fb702 https://linux.oracle.com/cve/CVE-2019-10638.html https://linux.oracle.com/errata/ELSA-2020-5845.html https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://seclists.org/bugtraq/2019/Aug/13 https://seclists.org/bugtraq/2019/Aug/18 https://seclists.org/bugtraq/2019/Nov/11 https://security.netapp.com/advisory/ntap-20190806-0001/ https://ubuntu.com/security/notices/USN-4114-1 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4116-1 https://ubuntu.com/security/notices/USN-4117-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4114-1/ https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4116-1/ https://usn.ubuntu.com/4117-1/ https://usn.ubuntu.com/4118-1/ https://www.debian.org/security/2019/dsa-4495 https://www.debian.org/security/2019/dsa-4497 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-10639 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html https://access.redhat.com/security/cve/CVE-2019-10639 https://arxiv.org/pdf/1906.10478.pdf https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=355b98553789b646ed97ad801a619ff898471b92 https://github.com/torvalds/linux/commit/355b98553789b646ed97ad801a619ff898471b92 https://linux.oracle.com/cve/CVE-2019-10639.html https://linux.oracle.com/errata/ELSA-2020-5845.html https://lists.debian.org/debian-lts-announce/2019/07/msg00022.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.html https://seclists.org/bugtraq/2019/Aug/18 https://security.netapp.com/advisory/ntap-20190806-0001/ https://support.f5.com/csp/article/K32804955 https://support.f5.com/csp/article/K32804955?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/ https://www.debian.org/security/2019/dsa-4497 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-11190 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html http://www.openwall.com/lists/oss-security/2019/04/15/1 http://www.securityfocus.com/bid/107890 https://access.redhat.com/security/cve/CVE-2019-11190 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190 https://git.kernel.org/linus/9f834ec18defc369d73ccf9e87a2790bfa05bf46 (4.8-rc5) https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=a5b5352558f6808db0589644ea5401b3e3148a0d https://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git/commit/?id=e1676b55d874a43646e8b2c46d87f2f3e45516ff https://linux.oracle.com/cve/CVE-2019-11190.html https://linux.oracle.com/errata/ELSA-2020-1016.html https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html https://ubuntu.com/security/notices/USN-4008-1 https://ubuntu.com/security/notices/USN-4008-3 https://usn.ubuntu.com/4008-1/ https://usn.ubuntu.com/4008-2/ https://usn.ubuntu.com/4008-3/ https://www.openwall.com/lists/oss-security/2019/04/03/4 https://www.openwall.com/lists/oss-security/2019/04/03/4/1
|
| kernel-headers | CVE-2019-12380 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html http://www.securityfocus.com/bid/108477 https://access.redhat.com/security/cve/CVE-2019-12380 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12380 https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=4e78921ba4dd0aca1cc89168f45039add4183f8e https://linux.oracle.com/cve/CVE-2019-12380.html https://linux.oracle.com/errata/ELSA-2020-5913.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/ https://security.netapp.com/advisory/ntap-20190710-0002/ https://ubuntu.com/security/notices/USN-4414-1 https://ubuntu.com/security/notices/USN-4427-1 https://ubuntu.com/security/notices/USN-4439-1 https://usn.ubuntu.com/4414-1/ https://usn.ubuntu.com/4427-1/ https://usn.ubuntu.com/4439-1/
|
| kernel-headers | CVE-2019-12614 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.securityfocus.com/bid/108550 https://access.redhat.com/security/cve/CVE-2019-12614 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614 https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=efa9ace68e487ddd29c2b4d6dd23242158f1f607 https://linux.oracle.com/cve/CVE-2019-12614.html https://linux.oracle.com/errata/ELSA-2020-4431.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/ https://lkml.org/lkml/2019/6/3/526 https://seclists.org/bugtraq/2020/Jan/10 https://security.netapp.com/advisory/ntap-20190710-0002/ https://support.f5.com/csp/article/K54337315 https://support.f5.com/csp/article/K54337315?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4093-1 https://ubuntu.com/security/notices/USN-4094-1 https://ubuntu.com/security/notices/USN-4095-1 https://ubuntu.com/security/notices/USN-4095-2 https://usn.ubuntu.com/4093-1/ https://usn.ubuntu.com/4094-1/ https://usn.ubuntu.com/4095-1/ https://usn.ubuntu.com/4095-2/
|
| kernel-headers | CVE-2019-15090 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html https://access.redhat.com/security/cve/CVE-2019-15090 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.12 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15090 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c09581a52765a85f19fc35340127396d5e3379cc https://github.com/torvalds/linux/commit/c09581a52765a85f19fc35340127396d5e3379cc https://linux.oracle.com/cve/CVE-2019-15090.html https://linux.oracle.com/errata/ELSA-2020-1769.html https://security.netapp.com/advisory/ntap-20190905-0002/ https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4147-1 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/ https://usn.ubuntu.com/4147-1/
|
| kernel-headers | CVE-2019-15099 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html https://access.redhat.com/security/cve/CVE-2019-15099 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15099 https://git.kernel.org/pub/scm/linux/kernel/git/kvalo/wireless-drivers-next.git/commit/?id=bfd6e6e6c5d2ee43a3d9902b36e01fc7527ebb27 https://linux.oracle.com/cve/CVE-2019-15099.html https://linux.oracle.com/errata/ELSA-2020-1769.html https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike@gmail.com/T/#u https://lore.kernel.org/linux-wireless/20191018133516.12606-1-linux@roeck-us.net/ https://security.netapp.com/advisory/ntap-20190905-0002/ https://support.f5.com/csp/article/K76295179 https://support.f5.com/csp/article/K76295179?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2019-15217 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://www.openwall.com/lists/oss-security/2019/08/20/2 http://www.openwall.com/lists/oss-security/2019/08/22/2 http://www.openwall.com/lists/oss-security/2019/08/22/3 http://www.openwall.com/lists/oss-security/2019/08/22/4 http://www.openwall.com/lists/oss-security/2019/08/22/5 https://access.redhat.com/security/cve/CVE-2019-15217 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e https://linux.oracle.com/cve/CVE-2019-15217.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=9c0c178c24d828a7378f483309001329750aad64 https://ubuntu.com/security/notices/USN-4147-1 https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://ubuntu.com/security/notices/USN-4302-1 https://usn.ubuntu.com/4147-1/ https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/ https://usn.ubuntu.com/4302-1/
|
| kernel-headers | CVE-2019-15218 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://www.openwall.com/lists/oss-security/2019/08/20/2 http://www.openwall.com/lists/oss-security/2019/08/22/2 http://www.openwall.com/lists/oss-security/2019/08/22/3 http://www.openwall.com/lists/oss-security/2019/08/22/4 http://www.openwall.com/lists/oss-security/2019/08/22/5 https://access.redhat.com/security/cve/CVE-2019-15218 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15218 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=31e0456de5be379b10fea0fa94a681057114a96e https://linux.oracle.com/cve/CVE-2019-15218.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=4a5d7c8c2b6dbedb5b7218c6d7e8666bd2387517 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4147-1 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/ https://usn.ubuntu.com/4147-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-15219 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://www.openwall.com/lists/oss-security/2019/08/20/2 http://www.openwall.com/lists/oss-security/2019/08/22/2 http://www.openwall.com/lists/oss-security/2019/08/22/3 http://www.openwall.com/lists/oss-security/2019/08/22/4 http://www.openwall.com/lists/oss-security/2019/08/22/5 https://access.redhat.com/security/cve/CVE-2019-15219 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15219 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9a5729f68d3a82786aea110b1bfe610be318f80a https://linux.oracle.com/cve/CVE-2019-15219.html https://linux.oracle.com/errata/ELSA-2019-4878.html https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=aaf6794922521df1c35c81e32cb2d0bb6a351e7b
|
| kernel-headers | CVE-2019-15221 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1127.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html http://www.openwall.com/lists/oss-security/2019/08/20/2 https://access.redhat.com/security/cve/CVE-2019-15221 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15221 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710 https://linux.oracle.com/cve/CVE-2019-15221.html https://linux.oracle.com/errata/ELSA-2020-1769.html https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=240f09164db2c3d3af33a117c713dc7650dc29d6 https://ubuntu.com/security/notices/USN-4115-1 https://ubuntu.com/security/notices/USN-4118-1 https://ubuntu.com/security/notices/USN-4147-1 https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://usn.ubuntu.com/4115-1/ https://usn.ubuntu.com/4118-1/ https://usn.ubuntu.com/4147-1/ https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/
|
| kernel-headers | CVE-2019-15291 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html http://www.openwall.com/lists/oss-security/2019/08/20/2 http://www.openwall.com/lists/oss-security/2019/08/22/1 https://access.redhat.com/security/cve/CVE-2019-15291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15291 https://linux.oracle.com/cve/CVE-2019-15291.html https://linux.oracle.com/errata/ELSA-2020-5569.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://seclists.org/bugtraq/2020/Jan/10 https://security.netapp.com/advisory/ntap-20190905-0002/ https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f https://ubuntu.com/security/notices/USN-4254-1 https://ubuntu.com/security/notices/USN-4254-2 https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4254-1/ https://usn.ubuntu.com/4254-2/ https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/ https://www.openwall.com/lists/oss-security/2019/08/20/2
|
| kernel-headers | CVE-2019-15807 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-15807 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.13 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807 https://git.kernel.org/linus/3b0541791453fbe7f42867e310e0c9eb6295364d https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0541791453fbe7f42867e310e0c9eb6295364d https://linux.oracle.com/cve/CVE-2019-15807.html https://linux.oracle.com/errata/ELSA-2020-5512.html https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html https://security.netapp.com/advisory/ntap-20191004-0001/ https://support.f5.com/csp/article/K52136304?utm_source=f5support&utm_medium=RSS
|
| kernel-headers | CVE-2019-15921 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html https://access.redhat.com/security/cve/CVE-2019-15921 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15921 https://git.kernel.org/linus/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 https://github.com/torvalds/linux/commit/ceabee6c59943bdd5e1da1a6a20dc7ee5f8113a2 https://security.netapp.com/advisory/ntap-20191004-0001/
|
| kernel-headers | CVE-2019-15924 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html https://access.redhat.com/security/cve/CVE-2019-15924 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15924 https://git.kernel.org/linus/01ca667133d019edc9f0a1f70a272447c84ec41f https://github.com/torvalds/linux/commit/01ca667133d019edc9f0a1f70a272447c84ec41f https://lists.debian.org/debian-lts-announce/2019/09/msg00014.html https://lists.debian.org/debian-lts-announce/2019/09/msg00015.html https://security.netapp.com/advisory/ntap-20191004-0001/
|
| kernel-headers | CVE-2019-16229 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-16229 https://bugzilla.suse.com/show_bug.cgi?id=1150469#c3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16229 https://lkml.org/lkml/2019/9/9/487 https://security.netapp.com/advisory/ntap-20191004-0001/ https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4285-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4285-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2019-16230 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-16230 https://bugzilla.suse.com/show_bug.cgi?id=1150468 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16230 https://lkml.org/lkml/2019/9/9/487 https://security.netapp.com/advisory/ntap-20191004-0001/
|
| kernel-headers | CVE-2019-16231 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00039.html https://access.redhat.com/security/cve/CVE-2019-16231 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=85ac30fa2e24f628e9f4f9344460f4015d33fd7d https://linux.oracle.com/cve/CVE-2019-16231.html https://linux.oracle.com/errata/ELSA-2020-5533.html https://lkml.org/lkml/2019/9/9/487 https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/ https://security.netapp.com/advisory/ntap-20191004-0001/ https://ubuntu.com/security/notices/USN-4225-1 https://ubuntu.com/security/notices/USN-4225-2 https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://ubuntu.com/security/notices/USN-4904-1 https://usn.ubuntu.com/4225-1/ https://usn.ubuntu.com/4225-2/ https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/
|
| kernel-headers | CVE-2019-16233 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00035.html https://access.redhat.com/security/cve/CVE-2019-16233 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233 https://linux.oracle.com/cve/CVE-2019-16233.html https://linux.oracle.com/errata/ELSA-2020-5508.html https://lkml.org/lkml/2019/9/9/487 https://security.netapp.com/advisory/ntap-20191004-0001/ https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://ubuntu.com/security/notices/USN-4346-1 https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/ https://usn.ubuntu.com/4346-1/
|
| kernel-headers | CVE-2019-16234 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00064.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00010.html https://access.redhat.com/security/cve/CVE-2019-16234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16234 https://linux.oracle.com/cve/CVE-2019-16234.html https://linux.oracle.com/errata/ELSA-2020-5804.html https://lkml.org/lkml/2019/9/9/487 https://lore.kernel.org/lkml/CADJ_3a8WFrs5NouXNqS5WYe7rebFP+_A5CheeqAyD_p7DFJJcg@mail.gmail.com/ https://security.netapp.com/advisory/ntap-20191004-0001/ https://ubuntu.com/security/notices/USN-4342-1 https://ubuntu.com/security/notices/USN-4344-1 https://ubuntu.com/security/notices/USN-4345-1 https://ubuntu.com/security/notices/USN-4346-1 https://usn.ubuntu.com/4342-1/ https://usn.ubuntu.com/4344-1/ https://usn.ubuntu.com/4345-1/ https://usn.ubuntu.com/4346-1/
|
| kernel-headers | CVE-2019-16994 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-16994 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=07f12b26e21ab359261bf75cfcb424fdc7daeb6d https://git.kernel.org/linus/07f12b26e21ab359261bf75cfcb424fdc7daeb6d https://github.com/torvalds/linux/commit/07f12b26e21ab359261bf75cfcb424fdc7daeb6d https://linux.oracle.com/cve/CVE-2019-16994.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://security.netapp.com/advisory/ntap-20191031-0005/
|
| kernel-headers | CVE-2019-18806 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-18806 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18806 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1acb8f2a7a9f10543868ddd737e37424d5c36cf4 https://git.kernel.org/linus/1acb8f2a7a9f10543868ddd737e37424d5c36cf4 https://linux.oracle.com/cve/CVE-2019-18806.html https://linux.oracle.com/errata/ELSA-2020-5649.html
|
| kernel-headers | CVE-2019-18885 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html https://access.redhat.com/security/cve/CVE-2019-18885 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18885 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=09ba3bc9dd150457c506e4661380a6183af651c1 https://github.com/bobfuzzer/CVE-2019-18885 https://github.com/torvalds/linux/commit/09ba3bc9dd150457c506e4661380a6183af651c1 https://linux.oracle.com/cve/CVE-2019-18885.html https://linux.oracle.com/errata/ELSA-2020-5885.html https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4254-1 https://ubuntu.com/security/notices/USN-4254-2 https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4254-1/ https://usn.ubuntu.com/4254-2/ https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-19039 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19039 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039 https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html https://ubuntu.com/security/notices/USN-4414-1 https://usn.ubuntu.com/4414-1/
|
| kernel-headers | CVE-2019-19054 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-19054 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19054 https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177 https://linux.oracle.com/cve/CVE-2019-19054.html https://linux.oracle.com/errata/ELSA-2020-5878.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4525-1 https://ubuntu.com/security/notices/USN-4526-1 https://ubuntu.com/security/notices/USN-4527-1 https://usn.ubuntu.com/4525-1/ https://usn.ubuntu.com/4526-1/ https://usn.ubuntu.com/4527-1/
|
| kernel-headers | CVE-2019-19056 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19056 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056 https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc https://linux.oracle.com/cve/CVE-2019-19056.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://ubuntu.com/security/notices/USN-4300-1 https://ubuntu.com/security/notices/USN-4301-1 https://ubuntu.com/security/notices/USN-4302-1 https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/ https://usn.ubuntu.com/4300-1/ https://usn.ubuntu.com/4301-1/ https://usn.ubuntu.com/4302-1/
|
| kernel-headers | CVE-2019-19057 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-19057 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057 https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c https://linux.oracle.com/cve/CVE-2019-19057.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://seclists.org/bugtraq/2020/Jan/10 https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4254-1 https://ubuntu.com/security/notices/USN-4254-2 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4285-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4254-1/ https://usn.ubuntu.com/4254-2/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4285-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2019-19058 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19058 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058 https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d https://linux.oracle.com/cve/CVE-2019-19058.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4300-1 https://ubuntu.com/security/notices/USN-4301-1 https://ubuntu.com/security/notices/USN-4302-1 https://usn.ubuntu.com/4300-1/ https://usn.ubuntu.com/4301-1/ https://usn.ubuntu.com/4302-1/
|
| kernel-headers | CVE-2019-19059 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-19059 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059 https://github.com/torvalds/linux/commit/0f4f199443faca715523b0659aa536251d8b978f https://linux.oracle.com/cve/CVE-2019-19059.html https://linux.oracle.com/errata/ELSA-2020-4060.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4300-1 https://ubuntu.com/security/notices/USN-4301-1 https://usn.ubuntu.com/4300-1/ https://usn.ubuntu.com/4301-1/
|
| kernel-headers | CVE-2019-19062 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-19062 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062 https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc https://linux.oracle.com/cve/CVE-2019-19062.html https://linux.oracle.com/errata/ELSA-2020-5837.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://seclists.org/bugtraq/2020/Jan/10 https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4254-1 https://ubuntu.com/security/notices/USN-4254-2 https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4254-1/ https://usn.ubuntu.com/4254-2/ https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2019-19063 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html https://access.redhat.com/security/cve/CVE-2019-19063 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063 https://github.com/torvalds/linux/commit/3f93616951138a598d930dcaec40f2bfd9ce43bb https://linux.oracle.com/cve/CVE-2019-19063.html https://linux.oracle.com/errata/ELSA-2021-9473.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://seclists.org/bugtraq/2020/Jan/10 https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4254-1 https://ubuntu.com/security/notices/USN-4254-2 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4285-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4254-1/ https://usn.ubuntu.com/4254-2/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4285-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-19065 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19065 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065 https://github.com/torvalds/linux/commit/34b3be18a04ecdc610aae4c48e5d1b799d8689f6 https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4208-1 https://ubuntu.com/security/notices/USN-4210-1 https://ubuntu.com/security/notices/USN-4226-1 https://usn.ubuntu.com/4208-1/ https://usn.ubuntu.com/4210-1/ https://usn.ubuntu.com/4226-1/
|
| kernel-headers | CVE-2019-19066 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-19066 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19066 https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0 https://linux.oracle.com/cve/CVE-2019-19066.html https://linux.oracle.com/errata/ELSA-2021-9473.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://ubuntu.com/security/notices/USN-4300-1 https://ubuntu.com/security/notices/USN-4301-1 https://ubuntu.com/security/notices/USN-4302-1 https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/ https://usn.ubuntu.com/4300-1/ https://usn.ubuntu.com/4301-1/ https://usn.ubuntu.com/4302-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-19073 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19073 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073 https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b https://linux.oracle.com/cve/CVE-2019-19073.html https://linux.oracle.com/errata/ELSA-2020-5881.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4526-1 https://ubuntu.com/security/notices/USN-4527-1 https://usn.ubuntu.com/4526-1/ https://usn.ubuntu.com/4527-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-19074 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19074 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074 https://github.com/torvalds/linux/commit/728c1e2a05e4b5fc52fab3421dce772a806612a2 https://linux.oracle.com/cve/CVE-2019-19074.html https://linux.oracle.com/errata/ELSA-2021-9473.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/ https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4526-1 https://ubuntu.com/security/notices/USN-4527-1 https://usn.ubuntu.com/4526-1/ https://usn.ubuntu.com/4527-1/ https://www.oracle.com/security-alerts/cpuApr2021.html
|
| kernel-headers | CVE-2019-19080 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19080 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080 https://github.com/torvalds/linux/commit/8572cea1461a006bce1d06c0c4b0575869125fa4 https://security.netapp.com/advisory/ntap-20191205-0001/
|
| kernel-headers | CVE-2019-19081 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19081 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081 https://github.com/torvalds/linux/commit/8ce39eb5a67aee25d9f05b40b673c95b23502e3e https://security.netapp.com/advisory/ntap-20191205-0001/
|
| kernel-headers | CVE-2019-19082 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19082 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082 https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4258-1 https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4258-1/ https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2019-19083 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html https://access.redhat.com/security/cve/CVE-2019-19083 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083 https://github.com/torvalds/linux/commit/055e547478a11a6360c7ce05e2afc3e366968a12 https://security.netapp.com/advisory/ntap-20191205-0001/ https://ubuntu.com/security/notices/USN-4208-1 https://ubuntu.com/security/notices/USN-4226-1 https://ubuntu.com/security/notices/USN-4227-1 https://ubuntu.com/security/notices/USN-4227-2 https://usn.ubuntu.com/4208-1/ https://usn.ubuntu.com/4226-1/ https://usn.ubuntu.com/4227-1/ https://usn.ubuntu.com/4227-2/
|
| kernel-headers | CVE-2019-19378 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19378 https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19378 https://security.netapp.com/advisory/ntap-20200103-0001/
|
| kernel-headers | CVE-2019-19533 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://www.openwall.com/lists/oss-security/2019/12/03/4 https://access.redhat.com/security/cve/CVE-2019-19533 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19533 https://git.kernel.org/linus/a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a10feaf8c464c3f9cfdd3a8a7ce17e1c0d498da1 https://linux.oracle.com/cve/CVE-2019-19533.html https://linux.oracle.com/errata/ELSA-2020-5755.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
|
| kernel-headers | CVE-2019-19965 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-19965 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19965 https://git.kernel.org/linus/f70267f379b5e5e11bdc5d72a56bf17e5feed01f https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f70267f379b5e5e11bdc5d72a56bf17e5feed01f https://linux.oracle.com/cve/CVE-2019-19965.html https://linux.oracle.com/errata/ELSA-2020-5879.html https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://security.netapp.com/advisory/ntap-20200204-0002/ https://ubuntu.com/security/notices/USN-4284-1 https://ubuntu.com/security/notices/USN-4285-1 https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4284-1/ https://usn.ubuntu.com/4285-1/ https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2019-20054 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-20054 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.11 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.6 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054 https://git.kernel.org/linus/23da9588037ecdd4901db76a5b79a42b529c4ec3 https://git.kernel.org/linus/89189557b47b35683a27c80ee78aef18248eefb4 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=23da9588037ecdd4901db76a5b79a42b529c4ec3 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=89189557b47b35683a27c80ee78aef18248eefb4 https://linux.oracle.com/cve/CVE-2019-20054.html https://linux.oracle.com/errata/ELSA-2020-5879.html https://security.netapp.com/advisory/ntap-20200204-0002/
|
| kernel-headers | CVE-2019-20095 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://access.redhat.com/security/cve/CVE-2019-20095 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.6 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095 https://git.kernel.org/linus/003b686ace820ce2d635a83f10f2d7f9c147dabc https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=003b686ace820ce2d635a83f10f2d7f9c147dabc https://linux.oracle.com/cve/CVE-2019-20095.html https://linux.oracle.com/errata/ELSA-2020-5533.html https://security.netapp.com/advisory/ntap-20200204-0002/
|
| kernel-headers | CVE-2019-20096 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html https://access.redhat.com/security/cve/CVE-2019-20096 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20096 https://git.kernel.org/linus/1d3ff0950e2b40dc861b1739029649d03f591820 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d3ff0950e2b40dc861b1739029649d03f591820 https://linux.oracle.com/cve/CVE-2019-20096.html https://linux.oracle.com/errata/ELSA-2020-5866.html https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html https://ubuntu.com/security/notices/USN-4285-1 https://ubuntu.com/security/notices/USN-4286-1 https://ubuntu.com/security/notices/USN-4286-2 https://ubuntu.com/security/notices/USN-4287-1 https://ubuntu.com/security/notices/USN-4287-2 https://usn.ubuntu.com/4285-1/ https://usn.ubuntu.com/4286-1/ https://usn.ubuntu.com/4286-2/ https://usn.ubuntu.com/4287-1/ https://usn.ubuntu.com/4287-2/
|
| kernel-headers | CVE-2020-10690 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html https://access.redhat.com/security/cve/CVE-2020-10690 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10690 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690 https://linux.oracle.com/cve/CVE-2020-10690.html https://linux.oracle.com/errata/ELSA-2020-5755.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lore.kernel.org/linux-fsdevel/20191125125342.6189-1-vdronov@redhat.com/T/#u https://nvd.nist.gov/vuln/detail/CVE-2020-10690 https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4419-1 https://usn.ubuntu.com/4419-1/
|
| kernel-headers | CVE-2020-10773 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-10773 https://bugzilla.redhat.com/show_bug.cgi?id=1846380 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b8e51a6a9db94bc1fb18ae831b3dab106b5a4b5f https://linux.oracle.com/cve/CVE-2020-10773.html https://linux.oracle.com/errata/ELSA-2020-4431.html
|
| kernel-headers | CVE-2020-10781 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-10781 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680 https://linux.oracle.com/cve/CVE-2020-10781.html https://linux.oracle.com/errata/ELSA-2020-5885.html https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html https://lore.kernel.org/linux-block/20200617103412.GA2027053@kroah.com/ https://nvd.nist.gov/vuln/detail/CVE-2020-10781 https://ubuntu.com/security/notices/USN-4483-1 https://ubuntu.com/security/notices/USN-4485-1 https://www.openwall.com/lists/oss-security/2020/06/18/1
|
| kernel-headers | CVE-2020-10942 | LOW | 3.10.0-1062.7.1.el7 | 3.10.0-1160.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00035.html http://www.openwall.com/lists/oss-security/2020/04/15/4 https://access.redhat.com/security/cve/CVE-2020-10942 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942 https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64 https://linux.oracle.com/cve/CVE-2020-10942.html https://linux.oracle.com/errata/ELSA-2020-5663.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://lkml.org/lkml/2020/2/15/125 https://nvd.nist.gov/vuln/detail/CVE-2020-10942 https://security.netapp.com/advisory/ntap-20200403-0003/ https://ubuntu.com/security/notices/USN-4342-1 https://ubuntu.com/security/notices/USN-4344-1 https://ubuntu.com/security/notices/USN-4345-1 https://ubuntu.com/security/notices/USN-4364-1 https://usn.ubuntu.com/4342-1/ https://usn.ubuntu.com/4344-1/ https://usn.ubuntu.com/4345-1/ https://usn.ubuntu.com/4364-1/ https://www.debian.org/security/2020/dsa-4667 https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-11608 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html https://access.redhat.com/security/cve/CVE-2020-11608 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=998912346c0da53a6dbb71fab3a138586b596b30 https://git.kernel.org/linus/998912346c0da53a6dbb71fab3a138586b596b30 https://github.com/torvalds/linux/commit/998912346c0da53a6dbb71fab3a138586b596b30 https://linux.oracle.com/cve/CVE-2020-11608.html https://linux.oracle.com/errata/ELSA-2021-1578.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-11608 https://security.netapp.com/advisory/ntap-20200430-0004/ https://ubuntu.com/security/notices/USN-4345-1 https://ubuntu.com/security/notices/USN-4364-1 https://ubuntu.com/security/notices/USN-4368-1 https://ubuntu.com/security/notices/USN-4369-1 https://usn.ubuntu.com/4345-1/ https://usn.ubuntu.com/4364-1/ https://usn.ubuntu.com/4368-1/ https://usn.ubuntu.com/4369-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-11609 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html https://access.redhat.com/security/cve/CVE-2020-11609 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.1 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=485b06aadb933190f4bc44e006076bc27a23f205 https://git.kernel.org/linus/485b06aadb933190f4bc44e006076bc27a23f205 https://github.com/torvalds/linux/commit/485b06aadb933190f4bc44e006076bc27a23f205 https://linux.oracle.com/cve/CVE-2020-11609.html https://linux.oracle.com/errata/ELSA-2020-5715.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://nvd.nist.gov/vuln/detail/CVE-2020-11609 https://security.netapp.com/advisory/ntap-20200430-0004/ https://ubuntu.com/security/notices/USN-4345-1 https://ubuntu.com/security/notices/USN-4364-1 https://ubuntu.com/security/notices/USN-4368-1 https://ubuntu.com/security/notices/USN-4369-1 https://usn.ubuntu.com/4345-1/ https://usn.ubuntu.com/4364-1/ https://usn.ubuntu.com/4368-1/ https://usn.ubuntu.com/4369-1/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-12652 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html https://access.redhat.com/security/cve/CVE-2020-12652 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.14 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12652 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28d76df18f0ad5bcf5fa48510b225f0ed262a99b https://git.kernel.org/linus/28d76df18f0ad5bcf5fa48510b225f0ed262a99b (5.5-rc7) https://github.com/torvalds/linux/commit/28d76df18f0ad5bcf5fa48510b225f0ed262a99b https://linux.oracle.com/cve/CVE-2020-12652.html https://linux.oracle.com/errata/ELSA-2021-9002.html https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html https://security.netapp.com/advisory/ntap-20200608-0001/ https://www.debian.org/security/2020/dsa-4698
|
| kernel-headers | CVE-2020-12655 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html https://access.redhat.com/security/cve/CVE-2020-12655 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12655 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d0c7feaf87678371c2c09b3709400be416b2dc62 https://git.kernel.org/linus/d0c7feaf87678371c2c09b3709400be416b2dc62 (5.7-rc1) https://github.com/torvalds/linux/commit/d0c7feaf87678371c2c09b3709400be416b2dc62 https://linux.oracle.com/cve/CVE-2020-12655.html https://linux.oracle.com/errata/ELSA-2020-5756.html https://lists.debian.org/debian-lts-announce/2020/08/msg00019.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES5C6ZCMALBEBMKNNCTBSLLSYGFZG3FF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IO5XIQSRI747P4RVVTNX7TUPEOCF4OPU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ2X3TM6RGRUS3KZAS26IJO5XGU7TBBR/ https://lore.kernel.org/linux-xfs/20200221153803.GP9506@magnolia/ https://nvd.nist.gov/vuln/detail/CVE-2020-12655 https://security.netapp.com/advisory/ntap-20200608-0001/ https://ubuntu.com/security/notices/USN-4465-1 https://ubuntu.com/security/notices/USN-4483-1 https://ubuntu.com/security/notices/USN-4485-1 https://ubuntu.com/security/notices/USN-5343-1 https://usn.ubuntu.com/4465-1/ https://usn.ubuntu.com/4483-1/ https://usn.ubuntu.com/4485-1/
|
| kernel-headers | CVE-2020-12656 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html https://access.redhat.com/security/cve/CVE-2020-12656 https://bugzilla.kernel.org/show_bug.cgi?id=206651 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656 https://nvd.nist.gov/vuln/detail/CVE-2020-12656 https://ubuntu.com/security/notices/USN-4483-1 https://ubuntu.com/security/notices/USN-4485-1 https://usn.ubuntu.com/4483-1/ https://usn.ubuntu.com/4485-1/
|
| kernel-headers | CVE-2020-14304 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-14304 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=960702 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14304 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14304 https://linux.oracle.com/cve/CVE-2020-14304.html https://linux.oracle.com/errata/ELSA-2021-9410.html https://lore.kernel.org/netdev/20200517172053.GA734488@decadent.org.uk/T/
|
| kernel-headers | CVE-2020-14390 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00021.html https://access.redhat.com/security/cve/CVE-2020-14390 https://bugzilla.redhat.com/show_bug.cgi?id=1876788 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14390 https://git.kernel.org/linus/50145474f6ef4a9c19205b173da6264a644c7489 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50145474f6ef4a9c19205b173da6264a644c7489 https://linux.oracle.com/cve/CVE-2020-14390.html https://linux.oracle.com/errata/ELSA-2020-5913.html https://lists.debian.org/debian-lts-announce/2020/10/msg00032.html https://lists.debian.org/debian-lts-announce/2020/10/msg00034.html https://nvd.nist.gov/vuln/detail/CVE-2020-14390 https://seclists.org/oss-sec/2020/q3/174 https://ubuntu.com/security/notices/USN-4657-1 https://ubuntu.com/security/notices/USN-4658-1 https://ubuntu.com/security/notices/USN-4660-1 https://ubuntu.com/security/notices/USN-4912-1 https://www.openwall.com/lists/oss-security/2020/09/15/2
|
| kernel-headers | CVE-2020-26146 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-26146 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-26146.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com
|
| kernel-headers | CVE-2020-26147 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/05/11/12 https://access.redhat.com/security/cve/CVE-2020-26147 https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26147 https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md https://linux.oracle.com/cve/CVE-2020-26147.html https://linux.oracle.com/errata/ELSA-2021-9459.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/ https://papers.mathyvanhoef.com/usenix2021.pdf https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu https://ubuntu.com/security/notices/USN-4997-1 https://ubuntu.com/security/notices/USN-4997-2 https://ubuntu.com/security/notices/USN-4999-1 https://ubuntu.com/security/notices/USN-5000-1 https://ubuntu.com/security/notices/USN-5000-2 https://ubuntu.com/security/notices/USN-5001-1 https://ubuntu.com/security/notices/USN-5018-1 https://ubuntu.com/security/notices/USN-5299-1 https://ubuntu.com/security/notices/USN-5343-1 https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 https://www.fragattacks.com
|
| kernel-headers | CVE-2020-27820 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27820 https://bugzilla.redhat.com/show_bug.cgi?id=1901726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27820 https://errata.almalinux.org/8/ALSA-2022-1988.html https://linux.oracle.com/cve/CVE-2020-27820.html https://linux.oracle.com/errata/ELSA-2022-1988.html https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/ https://lore.kernel.org/dri-devel/20201125202648.5220-1-jcline@redhat.com/ https://ubuntu.com/security/notices/USN-5265-1 https://ubuntu.com/security/notices/USN-5278-1 https://ubuntu.com/security/notices/USN-5413-1 https://ubuntu.com/security/notices/USN-5415-1
|
| kernel-headers | CVE-2020-29660 | LOW | 3.10.0-1062.7.1.el7 | | Expand...http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html http://www.openwall.com/lists/oss-security/2020/12/10/1 https://access.redhat.com/security/cve/CVE-2020-29660 https://bugs.chromium.org/p/project-zero/issues/detail?id=2125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29660 https://git.kernel.org/linus/c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9 https://linux.oracle.com/cve/CVE-2020-29660.html https://linux.oracle.com/errata/ELSA-2021-9039.html https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/ https://nvd.nist.gov/vuln/detail/CVE-2020-29660 https://security.netapp.com/advisory/ntap-20210122-0001/ https://ubuntu.com/security/notices/USN-4748-1 https://ubuntu.com/security/notices/USN-4749-1 https://ubuntu.com/security/notices/USN-4750-1 https://ubuntu.com/security/notices/USN-4751-1 https://ubuntu.com/security/notices/USN-4752-1 https://ubuntu.com/security/notices/USN-5130-1 https://www.debian.org/security/2021/dsa-4843
|
| kernel-headers | CVE-2020-35501 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-35501 https://bugzilla.redhat.com/show_bug.cgi?id=1908577 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35501 https://listman.redhat.com/archives/linux-audit/2018-July/msg00041.html https://nvd.nist.gov/vuln/detail/CVE-2020-35501 https://www.openwall.com/lists/oss-security/2021/02/18/1
|
| kernel-headers | CVE-2021-31916 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-31916 https://bugzilla.redhat.com/show_bug.cgi?id=1946965 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31916 https://git.kernel.org/linus/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a https://linux.oracle.com/cve/CVE-2021-31916.html https://linux.oracle.com/errata/ELSA-2021-9346.html https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html https://nvd.nist.gov/vuln/detail/CVE-2021-31916 https://seclists.org/oss-sec/2021/q1/268 https://ubuntu.com/security/notices/USN-4948-1 https://ubuntu.com/security/notices/USN-4979-1 https://ubuntu.com/security/notices/USN-4982-1 https://ubuntu.com/security/notices/USN-4984-1 https://ubuntu.com/security/notices/USN-5361-1 https://www.openwall.com/lists/oss-security/2021/03/28/1
|
| kernel-headers | CVE-2021-33135 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-33135 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33135 https://git.kernel.org/linus/08999b2489b4c9b939d7483dbd03702ee4576d96 (5.17-rc8) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00603.html
|
| kernel-headers | CVE-2021-3635 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-0129.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28950.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3573.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3600.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3635.json https://access.redhat.com/security/cve/CVE-2021-3635 https://bugzilla.redhat.com/show_bug.cgi?id=1976946 https://linux.oracle.com/cve/CVE-2021-3635.html https://linux.oracle.com/errata/ELSA-2021-4356.html
|
| kernel-headers | CVE-2021-3659 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3659 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3659 https://git.kernel.org/linus/1165affd484889d4986cf3b724318935a0b120d8 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8 https://linux.oracle.com/cve/CVE-2021-3659.html https://linux.oracle.com/errata/ELSA-2021-4356.html
|
| kernel-headers | CVE-2021-38198 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-38198 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12.11 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38198 https://github.com/torvalds/linux/commit/b1bd5cba3306691c771d558e94baa73e8b0b96b7 https://linux.oracle.com/cve/CVE-2021-38198.html https://linux.oracle.com/errata/ELSA-2021-9475.html https://lists.debian.org/debian-lts-announce/2021/10/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html https://nvd.nist.gov/vuln/detail/CVE-2021-38198 https://ubuntu.com/security/notices/USN-5070-1 https://ubuntu.com/security/notices/USN-5114-1 https://ubuntu.com/security/notices/USN-5116-1 https://ubuntu.com/security/notices/USN-5116-2 https://ubuntu.com/security/notices/USN-5343-1
|
| kernel-headers | CVE-2022-24448 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-24448 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac795161c93699d600db16c1a8cc23a65a1eceaf https://github.com/torvalds/linux/commit/ab0fc21bc7105b54bafd85bd8b82742f9e68898a https://github.com/torvalds/linux/commit/ac795161c93699d600db16c1a8cc23a65a1eceaf https://linux.oracle.com/cve/CVE-2022-24448.html https://linux.oracle.com/errata/ELSA-2022-9314.html https://lists.debian.org/debian-lts-announce/2022/03/msg00011.html https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html https://lore.kernel.org/all/67d6a536-9027-1928-99b6-af512a36cd1a@huawei.com/T/ https://nvd.nist.gov/vuln/detail/CVE-2022-24448 https://ubuntu.com/security/notices/USN-5302-1 https://ubuntu.com/security/notices/USN-5383-1 https://ubuntu.com/security/notices/USN-5384-1 https://ubuntu.com/security/notices/USN-5385-1 https://www.debian.org/security/2022/dsa-5092 https://www.debian.org/security/2022/dsa-5096 https://www.spinics.net/lists/stable/msg531976.html
|
| kernel-headers | CVE-2022-32296 | LOW | 3.10.0-1062.7.1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-32296 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.9 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4c2c8f03a5ab7cb04ec64724d7d176d00bcc91e5 https://nvd.nist.gov/vuln/detail/CVE-2022-32296
|
| krb5-devel | CVE-2014-5351 | MEDIUM | 1.15.1-46.el7 | | Expand...http://advisories.mageia.org/MGASA-2014-0477.html http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018 http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html http://security.gentoo.org/glsa/glsa-201412-53.xml http://www.mandriva.com/security/advisories?name=MDVSA-2014:224 http://www.securityfocus.com/bid/70380 http://www.securitytracker.com/id/1031003 http://www.ubuntu.com/usn/USN-2498-1 https://access.redhat.com/security/cve/CVE-2014-5351 https://bugzilla.redhat.com/show_bug.cgi?id=1145425 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351 https://exchange.xforce.ibmcloud.com/vulnerabilities/97028 https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://ubuntu.com/security/notices/USN-2498-1
|
| krb5-devel | CVE-2015-2695 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/90687 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695 https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| krb5-devel | CVE-2015-2696 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.securityfocus.com/bid/90675 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2696 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696 https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| krb5-devel | CVE-2015-2697 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/77581 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2697 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697 https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789 https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| krb5-devel | CVE-2017-15088 | MEDIUM | 1.15.1-46.el7 | | Expand...http://www.securityfocus.com/bid/101594 https://access.redhat.com/security/cve/CVE-2017-15088 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698 https://bugzilla.redhat.com/show_bug.cgi?id=1504045 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088 https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4 https://github.com/krb5/krb5/pull/707
|
| krb5-devel | CVE-2020-17049 | MEDIUM | 1.15.1-46.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3 https://access.redhat.com/security/cve/CVE-2020-17049 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
|
| krb5-devel | CVE-2020-28196 | MEDIUM | 1.15.1-46.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28196 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196 https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd https://linux.oracle.com/cve/CVE-2020-28196.html https://linux.oracle.com/errata/ELSA-2021-9294.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/ https://nvd.nist.gov/vuln/detail/CVE-2020-28196 https://security.gentoo.org/glsa/202011-17 https://security.netapp.com/advisory/ntap-20201202-0001/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://ubuntu.com/security/notices/USN-4635-1 https://www.debian.org/security/2020/dsa-4795 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html
|
| krb5-devel | CVE-2021-36222 | MEDIUM | 1.15.1-46.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
| krb5-devel | CVE-2021-37750 | MEDIUM | 1.15.1-46.el7 | 1.15.1-51.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
| krb5-devel | CVE-2017-11462 | LOW | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
| krb5-libs | CVE-2014-5351 | MEDIUM | 1.15.1-46.el7 | | Expand...http://advisories.mageia.org/MGASA-2014-0477.html http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018 http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html http://security.gentoo.org/glsa/glsa-201412-53.xml http://www.mandriva.com/security/advisories?name=MDVSA-2014:224 http://www.securityfocus.com/bid/70380 http://www.securitytracker.com/id/1031003 http://www.ubuntu.com/usn/USN-2498-1 https://access.redhat.com/security/cve/CVE-2014-5351 https://bugzilla.redhat.com/show_bug.cgi?id=1145425 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351 https://exchange.xforce.ibmcloud.com/vulnerabilities/97028 https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://ubuntu.com/security/notices/USN-2498-1
|
| krb5-libs | CVE-2015-2695 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/90687 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695 https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| krb5-libs | CVE-2015-2696 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.securityfocus.com/bid/90675 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2696 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696 https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| krb5-libs | CVE-2015-2697 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/77581 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2697 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697 https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789 https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| krb5-libs | CVE-2017-15088 | MEDIUM | 1.15.1-46.el7 | | Expand...http://www.securityfocus.com/bid/101594 https://access.redhat.com/security/cve/CVE-2017-15088 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698 https://bugzilla.redhat.com/show_bug.cgi?id=1504045 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088 https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4 https://github.com/krb5/krb5/pull/707
|
| krb5-libs | CVE-2020-17049 | MEDIUM | 1.15.1-46.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3 https://access.redhat.com/security/cve/CVE-2020-17049 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
|
| krb5-libs | CVE-2020-28196 | MEDIUM | 1.15.1-46.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28196 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196 https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd https://linux.oracle.com/cve/CVE-2020-28196.html https://linux.oracle.com/errata/ELSA-2021-9294.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/ https://nvd.nist.gov/vuln/detail/CVE-2020-28196 https://security.gentoo.org/glsa/202011-17 https://security.netapp.com/advisory/ntap-20201202-0001/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://ubuntu.com/security/notices/USN-4635-1 https://www.debian.org/security/2020/dsa-4795 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html
|
| krb5-libs | CVE-2021-36222 | MEDIUM | 1.15.1-46.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
| krb5-libs | CVE-2021-37750 | MEDIUM | 1.15.1-46.el7 | 1.15.1-51.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
| krb5-libs | CVE-2017-11462 | LOW | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
| less | CVE-2014-9488 | LOW | 458-9.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0139.html http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159449.html http://lists.opensuse.org/opensuse-updates/2015-03/msg00077.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:199 http://www.openwall.com/lists/oss-security/2015/03/10/14 https://access.redhat.com/security/cve/CVE-2014-9488 https://blog.fuzzing-project.org/3-less-out-of-bounds-read-access-TFPA-0022014.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488
|
| libX11 | CVE-2021-31535 | HIGH | 1.6.7-3.el7_9 | 1.6.7-4.el7_9 | Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html http://seclists.org/fulldisclosure/2021/May/52 http://www.openwall.com/lists/oss-security/2021/05/18/2 https://access.redhat.com/security/cve/CVE-2021-31535 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535 https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605 https://linux.oracle.com/cve/CVE-2021-31535.html https://linux.oracle.com/errata/ELSA-2021-4326.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/ https://lists.freedesktop.org/archives/xorg/ https://lists.x.org/archives/xorg-announce/2021-May/003088.html https://security.gentoo.org/glsa/202105-16 https://security.netapp.com/advisory/ntap-20210813-0001/ https://ubuntu.com/security/notices/USN-4966-1 https://ubuntu.com/security/notices/USN-4966-2 https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/ https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt https://www.debian.org/security/2021/dsa-4920 https://www.openwall.com/lists/oss-security/2021/05/18/2 https://www.openwall.com/lists/oss-security/2021/05/18/3
|
| libX11 | CVE-2016-7943 | MEDIUM | 1.6.7-3.el7_9 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93362 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7943 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
| libX11 | CVE-2020-14344 | MEDIUM | 1.6.7-3.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html https://access.redhat.com/security/cve/CVE-2020-14344 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344 https://linux.oracle.com/cve/CVE-2020-14344.html https://linux.oracle.com/errata/ELSA-2021-1804.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/ https://lists.x.org/archives/xorg-announce/2020-July/003050.html https://security.gentoo.org/glsa/202008-18 https://ubuntu.com/security/notices/USN-4487-1 https://ubuntu.com/security/notices/USN-4487-2 https://usn.ubuntu.com/4487-1/ https://usn.ubuntu.com/4487-2/ https://www.openwall.com/lists/oss-security/2020/07/31/1
|
| libX11 | CVE-2016-7942 | LOW | 1.6.7-3.el7_9 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93363 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7942 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
| libX11-common | CVE-2021-31535 | HIGH | 1.6.7-3.el7_9 | 1.6.7-4.el7_9 | Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html http://seclists.org/fulldisclosure/2021/May/52 http://www.openwall.com/lists/oss-security/2021/05/18/2 https://access.redhat.com/security/cve/CVE-2021-31535 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535 https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605 https://linux.oracle.com/cve/CVE-2021-31535.html https://linux.oracle.com/errata/ELSA-2021-4326.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/ https://lists.freedesktop.org/archives/xorg/ https://lists.x.org/archives/xorg-announce/2021-May/003088.html https://security.gentoo.org/glsa/202105-16 https://security.netapp.com/advisory/ntap-20210813-0001/ https://ubuntu.com/security/notices/USN-4966-1 https://ubuntu.com/security/notices/USN-4966-2 https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/ https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt https://www.debian.org/security/2021/dsa-4920 https://www.openwall.com/lists/oss-security/2021/05/18/2 https://www.openwall.com/lists/oss-security/2021/05/18/3
|
| libX11-common | CVE-2016-7943 | MEDIUM | 1.6.7-3.el7_9 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93362 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7943 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
| libX11-common | CVE-2020-14344 | MEDIUM | 1.6.7-3.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html https://access.redhat.com/security/cve/CVE-2020-14344 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344 https://linux.oracle.com/cve/CVE-2020-14344.html https://linux.oracle.com/errata/ELSA-2021-1804.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/ https://lists.x.org/archives/xorg-announce/2020-July/003050.html https://security.gentoo.org/glsa/202008-18 https://ubuntu.com/security/notices/USN-4487-1 https://ubuntu.com/security/notices/USN-4487-2 https://usn.ubuntu.com/4487-1/ https://usn.ubuntu.com/4487-2/ https://www.openwall.com/lists/oss-security/2020/07/31/1
|
| libX11-common | CVE-2016-7942 | LOW | 1.6.7-3.el7_9 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93363 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7942 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
| libX11-devel | CVE-2021-31535 | HIGH | 1.6.7-3.el7_9 | 1.6.7-4.el7_9 | Expand...http://packetstormsecurity.com/files/162737/libX11-Insufficient-Length-Check-Injection.html http://seclists.org/fulldisclosure/2021/May/52 http://www.openwall.com/lists/oss-security/2021/05/18/2 https://access.redhat.com/security/cve/CVE-2021-31535 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535 https://gitlab.freedesktop.org/xorg/lib/libx11/-/commit/8d2e02ae650f00c4a53deb625211a0527126c605 https://linux.oracle.com/cve/CVE-2021-31535.html https://linux.oracle.com/errata/ELSA-2021-4326.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/05/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEOT4RLB76RVPJQKGGTIKTBIOLHX2NR6/ https://lists.freedesktop.org/archives/xorg/ https://lists.x.org/archives/xorg-announce/2021-May/003088.html https://security.gentoo.org/glsa/202105-16 https://security.netapp.com/advisory/ntap-20210813-0001/ https://ubuntu.com/security/notices/USN-4966-1 https://ubuntu.com/security/notices/USN-4966-2 https://unparalleled.eu/blog/2021/20210518-using-xterm-to-navigate-the-huge-color-space/ https://unparalleled.eu/publications/2021/advisory-unpar-2021-1.txt https://www.debian.org/security/2021/dsa-4920 https://www.openwall.com/lists/oss-security/2021/05/18/2 https://www.openwall.com/lists/oss-security/2021/05/18/3
|
| libX11-devel | CVE-2016-7943 | MEDIUM | 1.6.7-3.el7_9 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93362 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7943 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7943 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
| libX11-devel | CVE-2020-14344 | MEDIUM | 1.6.7-3.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00031.html https://access.redhat.com/security/cve/CVE-2020-14344 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14344 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14344 https://linux.oracle.com/cve/CVE-2020-14344.html https://linux.oracle.com/errata/ELSA-2021-1804.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VDDSAYV7XGNRCXE7HCU23645MG74OFF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7AVXCQOSCAPKYYHFIJAZ6E2C7LJBTLXF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XY4H2SIEF2362AMNX5ZKWAELGU7LKFJB/ https://lists.x.org/archives/xorg-announce/2020-July/003050.html https://security.gentoo.org/glsa/202008-18 https://ubuntu.com/security/notices/USN-4487-1 https://ubuntu.com/security/notices/USN-4487-2 https://usn.ubuntu.com/4487-1/ https://usn.ubuntu.com/4487-2/ https://www.openwall.com/lists/oss-security/2020/07/31/1
|
| libX11-devel | CVE-2016-7942 | LOW | 1.6.7-3.el7_9 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93363 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7942 https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-3758-1 https://ubuntu.com/security/notices/USN-3758-2 https://usn.ubuntu.com/3758-1/ https://usn.ubuntu.com/3758-2/
|
| libXfixes | CVE-2016-7944 | MEDIUM | 5.0.3-1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93361 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7944 https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CE6VJWBMOWLSCH4OP4TAEPIA7NP53ON/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GE43MDCRGS4R7MRRZNVSLREHRLU5OHCV/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-5437-1
|
| libXfixes-devel | CVE-2016-7944 | MEDIUM | 5.0.3-1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93361 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7944 https://cgit.freedesktop.org/xorg/lib/libXfixes/commit/?id=61c1039ee23a2d1de712843bed3480654d7ef42e https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4CE6VJWBMOWLSCH4OP4TAEPIA7NP53ON/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GE43MDCRGS4R7MRRZNVSLREHRLU5OHCV/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-5437-1
|
| libXi | CVE-2016-7945 | MEDIUM | 1.7.9-1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93364 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7945 https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03
|
| libXi | CVE-2016-7946 | LOW | 1.7.9-1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93374 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7946 https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03
|
| libXrender | CVE-2016-7949 | MEDIUM | 0.9.10-1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93366 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7949 https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=9362c7ddd1af3b168953d0737877bc52d79c94f4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-5436-1
|
| libXrender | CVE-2016-7950 | MEDIUM | 0.9.10-1.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/10/04/2 http://www.openwall.com/lists/oss-security/2016/10/04/4 http://www.securityfocus.com/bid/93369 http://www.securitytracker.com/id/1036945 https://access.redhat.com/security/cve/CVE-2016-7950 https://cgit.freedesktop.org/xorg/lib/libXrender/commit/?id=8fad00b0b647ee662ce4737ca15be033b7a21714 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WCKZFMZ76APAVMIRCUKKHEB4GAS7ZUP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHUT5YOSWVMBJNWZGUQNZRBFIZKRM4A6/ https://lists.x.org/archives/xorg-announce/2016-October/002720.html https://security.gentoo.org/glsa/201704-03 https://ubuntu.com/security/notices/USN-5436-1
|
| libblkid | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html http://www.openwall.com/lists/oss-security/2014/11/26/13 http://www.openwall.com/lists/oss-security/2014/11/26/21 http://www.securityfocus.com/bid/71327 https://access.redhat.com/security/cve/CVE-2014-9114 https://bugzilla.redhat.com/show_bug.cgi?id=1168485 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114 https://exchange.xforce.ibmcloud.com/vulnerabilities/98993 https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201612-14
|
| libblkid | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1 http://www.openwall.com/lists/oss-security/2016/02/27/2 https://access.redhat.com/security/cve/CVE-2016-2779 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
|
| libblkid | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0563 https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.netapp.com/advisory/ntap-20220331-0002/
|
| libblkid | CVE-2015-5218 | LOW | 2.23.2-61.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html http://www.spinics.net/lists/util-linux-ng/msg11873.html https://access.redhat.com/security/cve/CVE-2015-5218 https://bugzilla.redhat.com/show_bug.cgi?id=1259322 https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8 https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| libblkid | CVE-2021-37600 | LOW | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://nvd.nist.gov/vuln/detail/CVE-2021-37600 https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libcom_err | CVE-2015-0247 | MEDIUM | 1.42.9-17.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0061.html http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4 http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html http://www.debian.org/security/2015/dsa-3166 http://www.mandriva.com/security/advisories?name=MDVSA-2015:045 http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 http://www.ocert.org/advisories/ocert-2015-002.html http://www.securityfocus.com/archive/1/534633/100/0/threaded http://www.securityfocus.com/bid/72520 http://www.ubuntu.com/usn/USN-2507-1 https://access.redhat.com/security/cve/CVE-2015-0247 https://bugzilla.redhat.com/show_bug.cgi?id=1187032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247 https://exchange.xforce.ibmcloud.com/vulnerabilities/100740 https://security.gentoo.org/glsa/201701-06 https://ubuntu.com/security/notices/USN-2507-1
|
| libcom_err | CVE-2019-5094 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-5094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094 https://linux.oracle.com/cve/CVE-2019-5094.html https://linux.oracle.com/errata/ELSA-2020-4011.html https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/ https://nvd.nist.gov/vuln/detail/CVE-2019-5094 https://seclists.org/bugtraq/2019/Sep/58 https://security.gentoo.org/glsa/202003-05 https://security.netapp.com/advisory/ntap-20200115-0002/ https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887 https://ubuntu.com/security/notices/USN-4142-1 https://ubuntu.com/security/notices/USN-4142-2 https://usn.ubuntu.com/4142-1/ https://usn.ubuntu.com/4142-2/ https://www.debian.org/security/2019/dsa-4535
|
| libcom_err | CVE-2019-5188 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html https://access.redhat.com/security/cve/CVE-2019-5188 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188 https://linux.oracle.com/cve/CVE-2019-5188.html https://linux.oracle.com/errata/ELSA-2020-4011.html https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/ https://nvd.nist.gov/vuln/detail/CVE-2019-5188 https://security.netapp.com/advisory/ntap-20220506-0001/ https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973 https://ubuntu.com/security/notices/USN-4249-1 https://usn.ubuntu.com/4249-1/
|
| libcom_err | CVE-2022-1304 | MEDIUM | 1.42.9-17.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
| libcom_err | CVE-2015-1572 | LOW | 1.42.9-17.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0088.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html http://www.debian.org/security/2015/dsa-3166 http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 http://www.mandriva.com/security/advisories?name=MDVSA-2015:068 http://www.securityfocus.com/bid/72709 http://www.ubuntu.com/usn/USN-2507-1 https://access.redhat.com/security/cve/CVE-2015-1572 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572 https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73 https://security.gentoo.org/glsa/201507-22 https://ubuntu.com/security/notices/USN-2507-1
|
| libcom_err-devel | CVE-2015-0247 | MEDIUM | 1.42.9-17.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0061.html http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4 http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html http://www.debian.org/security/2015/dsa-3166 http://www.mandriva.com/security/advisories?name=MDVSA-2015:045 http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 http://www.ocert.org/advisories/ocert-2015-002.html http://www.securityfocus.com/archive/1/534633/100/0/threaded http://www.securityfocus.com/bid/72520 http://www.ubuntu.com/usn/USN-2507-1 https://access.redhat.com/security/cve/CVE-2015-0247 https://bugzilla.redhat.com/show_bug.cgi?id=1187032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0247 https://exchange.xforce.ibmcloud.com/vulnerabilities/100740 https://security.gentoo.org/glsa/201701-06 https://ubuntu.com/security/notices/USN-2507-1
|
| libcom_err-devel | CVE-2019-5094 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 | Expand...https://access.redhat.com/security/cve/CVE-2019-5094 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094 https://linux.oracle.com/cve/CVE-2019-5094.html https://linux.oracle.com/errata/ELSA-2020-4011.html https://lists.debian.org/debian-lts-announce/2019/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/ https://nvd.nist.gov/vuln/detail/CVE-2019-5094 https://seclists.org/bugtraq/2019/Sep/58 https://security.gentoo.org/glsa/202003-05 https://security.netapp.com/advisory/ntap-20200115-0002/ https://talosintelligence.com/vulnerability_reports/TALOS-2019-0887 https://ubuntu.com/security/notices/USN-4142-1 https://ubuntu.com/security/notices/USN-4142-2 https://usn.ubuntu.com/4142-1/ https://usn.ubuntu.com/4142-2/ https://www.debian.org/security/2019/dsa-4535
|
| libcom_err-devel | CVE-2019-5188 | MEDIUM | 1.42.9-17.el7 | 1.42.9-19.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00004.html https://access.redhat.com/security/cve/CVE-2019-5188 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188 https://linux.oracle.com/cve/CVE-2019-5188.html https://linux.oracle.com/errata/ELSA-2020-4011.html https://lists.debian.org/debian-lts-announce/2020/03/msg00030.html https://lists.debian.org/debian-lts-announce/2020/07/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AKETJ6BREDUHRWQTV35SPGG5C6H7KSI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DOBCYQKCTTWXBLMUPJ5TX3FY7JNCOKY/ https://nvd.nist.gov/vuln/detail/CVE-2019-5188 https://security.netapp.com/advisory/ntap-20220506-0001/ https://talosintelligence.com/vulnerability_reports/TALOS-2019-0973 https://ubuntu.com/security/notices/USN-4249-1 https://usn.ubuntu.com/4249-1/
|
| libcom_err-devel | CVE-2022-1304 | MEDIUM | 1.42.9-17.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1304 https://bugzilla.redhat.com/show_bug.cgi?id=2069726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304 https://marc.info/?l=linux-ext4&m=165056234501732&w=2 https://nvd.nist.gov/vuln/detail/CVE-2022-1304 https://ubuntu.com/security/notices/USN-5464-1
|
| libcom_err-devel | CVE-2015-1572 | LOW | 1.42.9-17.el7 | | Expand...http://advisories.mageia.org/MGASA-2015-0088.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00006.html http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html http://www.debian.org/security/2015/dsa-3166 http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 http://www.mandriva.com/security/advisories?name=MDVSA-2015:068 http://www.securityfocus.com/bid/72709 http://www.ubuntu.com/usn/USN-2507-1 https://access.redhat.com/security/cve/CVE-2015-1572 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572 https://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=49d0fe2a14f2a23da2fe299643379b8c1d37df73 https://security.gentoo.org/glsa/201507-22 https://ubuntu.com/security/notices/USN-2507-1
|
| libcurl | CVE-2015-3153 | MEDIUM | 7.29.0-54.el7 | | Expand...http://curl.haxx.se/docs/adv_20150429.html http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html http://www.debian.org/security/2015/dsa-3240 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html http://www.securityfocus.com/bid/74408 http://www.securitytracker.com/id/1032233 http://www.ubuntu.com/usn/USN-2591-1 https://access.redhat.com/security/cve/CVE-2015-3153 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153 https://kc.mcafee.com/corporate/index?page=content&id=SB10131 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2591-1
|
| libcurl | CVE-2016-8615 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94096 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8615 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615 https://curl.haxx.se/CVE-2016-8615.patch https://curl.haxx.se/docs/adv_20161102A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615 https://linux.oracle.com/cve/CVE-2016-8615.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8617 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94097 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8617 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617 https://curl.haxx.se/CVE-2016-8617.patch https://curl.haxx.se/docs/adv_20161102C.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617 https://linux.oracle.com/cve/CVE-2016-8617.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8618 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94098 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8618 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8618 https://curl.haxx.se/docs/adv_20161102D.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618 https://linux.oracle.com/cve/CVE-2016-8618.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8619 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94100 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8619 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8619 https://curl.haxx.se/CVE-2016-8619.patch https://curl.haxx.se/docs/adv_20161102E.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619 https://linux.oracle.com/cve/CVE-2016-8619.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8624 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94103 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8624 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624 https://curl.haxx.se/docs/adv_20161102J.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624 https://linux.oracle.com/cve/CVE-2016-8624.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8625 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.securityfocus.com/bid/94107 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8625 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8625 https://curl.haxx.se/CVE-2016-8625.patch https://curl.haxx.se/docs/adv_20161102K.html https://linux.oracle.com/cve/CVE-2016-8625.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2017-1000254 | MEDIUM | 7.29.0-54.el7 | | Expand...http://www.debian.org/security/2017/dsa-3992 http://www.securityfocus.com/bid/101115 http://www.securitytracker.com/id/1039509 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000254 https://curl.haxx.se/673d0cd8.patch https://curl.haxx.se/docs/adv_20171004.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201712-04 https://support.apple.com/HT208331 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| libcurl | CVE-2017-8817 | MEDIUM | 7.29.0-54.el7 | | Expand...http://security.cucumberlinux.com/security/details.php?id=162 http://www.securityfocus.com/bid/102057 http://www.securitytracker.com/id/1039897 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-8817 https://curl.haxx.se/docs/adv_2017-ae72.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817 https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html https://security.gentoo.org/glsa/201712-04 https://ubuntu.com/security/notices/USN-3498-1 https://ubuntu.com/security/notices/USN-3498-2 https://www.debian.org/security/2017/dsa-4051
|
| libcurl | CVE-2019-5482 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html https://access.redhat.com/security/cve/CVE-2019-5482 https://curl.haxx.se/docs/CVE-2019-5482.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482 https://linux.oracle.com/cve/CVE-2019-5482.html https://linux.oracle.com/errata/ELSA-2020-5562.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20191004-0003/ https://security.netapp.com/advisory/ntap-20200416-0003/ https://ubuntu.com/security/notices/USN-4129-1 https://ubuntu.com/security/notices/USN-4129-2 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
| libcurl | CVE-2020-8177 | MEDIUM | 7.29.0-54.el7 | 7.29.0-59.el7_9.1 | Expand...https://access.redhat.com/security/cve/CVE-2020-8177 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.haxx.se/docs/CVE-2020-8177.html https://curl.se/docs/CVE-2020-8177.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177 https://hackerone.com/reports/887462 https://linux.oracle.com/cve/CVE-2020-8177.html https://linux.oracle.com/errata/ELSA-2020-5002.html https://nvd.nist.gov/vuln/detail/CVE-2020-8177 https://ubuntu.com/security/notices/USN-4402-1 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com/security-alerts/cpujan2022.html
|
| libcurl | CVE-2020-8284 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8284 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2020-8284.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284 https://hackerone.com/reports/1040166 https://linux.oracle.com/cve/CVE-2020-8284.html https://linux.oracle.com/errata/ELSA-2021-1610.html https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ https://nvd.nist.gov/vuln/detail/CVE-2020-8284 https://security.gentoo.org/glsa/202012-14 https://security.netapp.com/advisory/ntap-20210122-0007/ https://support.apple.com/kb/HT212325 https://support.apple.com/kb/HT212326 https://support.apple.com/kb/HT212327 https://ubuntu.com/security/notices/USN-4665-1 https://ubuntu.com/security/notices/USN-4665-2 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| libcurl | CVE-2020-8285 | MEDIUM | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2021/Apr/51 https://access.redhat.com/security/cve/CVE-2020-8285 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2020-8285.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285 https://github.com/curl/curl/issues/6255 https://hackerone.com/reports/1045844 https://linux.oracle.com/cve/CVE-2020-8285.html https://linux.oracle.com/errata/ELSA-2021-1610.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/ https://nvd.nist.gov/vuln/detail/CVE-2020-8285 https://security.gentoo.org/glsa/202012-14 https://security.netapp.com/advisory/ntap-20210122-0007/ https://support.apple.com/kb/HT212325 https://support.apple.com/kb/HT212326 https://support.apple.com/kb/HT212327 https://ubuntu.com/security/notices/USN-4665-1 https://ubuntu.com/security/notices/USN-4665-2 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| libcurl | CVE-2021-22876 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-22876 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22876.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876 https://errata.almalinux.org/8/ALSA-2021-4511.html https://hackerone.com/reports/1101882 https://linux.oracle.com/cve/CVE-2021-22876.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/ https://security.gentoo.org/glsa/202105-36 https://security.netapp.com/advisory/ntap-20210521-0007/ https://ubuntu.com/security/notices/USN-4898-1 https://ubuntu.com/security/notices/USN-4903-1 https://www.oracle.com//security-alerts/cpujul2021.html
|
| libcurl | CVE-2021-22924 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-22924 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf https://curl.se/docs/CVE-2021-22924.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924 https://hackerone.com/reports/1223565 https://linux.oracle.com/cve/CVE-2021-22924.html https://linux.oracle.com/errata/ELSA-2021-3582.html https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22924 https://security.netapp.com/advisory/ntap-20210902-0003/ https://ubuntu.com/security/notices/USN-5021-1 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl | CVE-2021-22946 | MEDIUM | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json https://access.redhat.com/security/cve/CVE-2021-22946 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22946.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946 https://hackerone.com/reports/1334111 https://linux.oracle.com/cve/CVE-2021-22946.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22946 https://security.netapp.com/advisory/ntap-20211029-0003/ https://security.netapp.com/advisory/ntap-20220121-0008/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl | CVE-2021-22947 | MEDIUM | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2022/Mar/29 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json https://access.redhat.com/security/cve/CVE-2021-22947 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22947.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947 https://hackerone.com/reports/1334763 https://launchpad.net/bugs/1944120 (regression bug) https://linux.oracle.com/cve/CVE-2021-22947.html https://linux.oracle.com/errata/ELSA-2021-4059.html https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/ https://nvd.nist.gov/vuln/detail/CVE-2021-22947 https://security.netapp.com/advisory/ntap-20211029-0003/ https://support.apple.com/kb/HT213183 https://ubuntu.com/security/notices/USN-5079-1 https://ubuntu.com/security/notices/USN-5079-2 https://ubuntu.com/security/notices/USN-5079-3 https://ubuntu.com/security/notices/USN-5079-4 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl | CVE-2022-27774 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27774 https://curl.se/docs/CVE-2022-27774.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774 https://hackerone.com/reports/1543773 https://nvd.nist.gov/vuln/detail/CVE-2022-27774 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27776 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27776 https://curl.se/docs/CVE-2022-27776.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776 https://hackerone.com/reports/1547048 https://nvd.nist.gov/vuln/detail/CVE-2022-27776 https://security.netapp.com/advisory/ntap-20220609-0008/ https://ubuntu.com/security/notices/USN-5397-1
|
| libcurl | CVE-2022-27778 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27778 https://hackerone.com/reports/1553598 https://nvd.nist.gov/vuln/detail/CVE-2022-27778 https://security.netapp.com/advisory/ntap-20220609-0009/
|
| libcurl | CVE-2022-27779 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27779 https://hackerone.com/reports/1553301 https://nvd.nist.gov/vuln/detail/CVE-2022-27779 https://security.netapp.com/advisory/ntap-20220609-0009/
|
| libcurl | CVE-2022-27780 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27780 https://curl.se/docs/CVE-2022-27780.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27780 https://hackerone.com/reports/1553841 https://nvd.nist.gov/vuln/detail/CVE-2022-27780 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
| libcurl | CVE-2022-27782 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27782 https://curl.se/docs/CVE-2022-27782.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782 https://hackerone.com/reports/1555796 https://nvd.nist.gov/vuln/detail/CVE-2022-27782 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
| libcurl | CVE-2022-30115 | MEDIUM | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-30115 https://hackerone.com/reports/1557449 https://nvd.nist.gov/vuln/detail/CVE-2022-30115 https://security.netapp.com/advisory/ntap-20220609-0009/
|
| libcurl | CVE-2016-0755 | LOW | 7.29.0-54.el7 | | Expand...http://curl.haxx.se/docs/adv_20160127A.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html http://www.debian.org/security/2016/dsa-3455 http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/82307 http://www.securitytracker.com/id/1034882 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965 http://www.ubuntu.com/usn/USN-2882-1 https://access.redhat.com/security/cve/CVE-2016-0755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755 https://security.gentoo.org/glsa/201701-47 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-2882-1
|
| libcurl | CVE-2016-8616 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94094 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8616 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8616 https://curl.haxx.se/CVE-2016-8616.patch https://curl.haxx.se/docs/adv_20161102B.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616 https://linux.oracle.com/cve/CVE-2016-8616.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8621 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94101 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8621 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621 https://curl.haxx.se/CVE-2016-8621.patch https://curl.haxx.se/docs/adv_20161102G.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621 https://linux.oracle.com/cve/CVE-2016-8621.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8622 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94105 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8622 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622 https://curl.haxx.se/docs/adv_20161102H.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622 https://linux.oracle.com/cve/CVE-2016-8622.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-8623 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/94106 http://www.securitytracker.com/id/1037192 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-8623 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623 https://curl.haxx.se/CVE-2016-8623.patch https://curl.haxx.se/docs/adv_20161102I.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623 https://linux.oracle.com/cve/CVE-2016-8623.html https://linux.oracle.com/errata/ELSA-2019-4652.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3123-1 https://www.tenable.com/security/tns-2016-21
|
| libcurl | CVE-2016-9586 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html http://www.securityfocus.com/bid/95019 http://www.securitytracker.com/id/1037515 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2016-9586 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586 https://curl.haxx.se/docs/adv_20161221A.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586 https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html https://security.gentoo.org/glsa/201701-47 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| libcurl | CVE-2017-1000100 | LOW | 7.29.0-54.el7 | | Expand...http://www.debian.org/security/2017/dsa-3992 http://www.securityfocus.com/bid/100286 http://www.securitytracker.com/id/1039118 https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-1000100 https://curl.haxx.se/docs/adv_20170809B.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100 https://security.gentoo.org/glsa/201709-14 https://support.apple.com/HT208221 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| libcurl | CVE-2017-7407 | LOW | 7.29.0-54.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html https://access.redhat.com/errata/RHSA-2018:3558 https://access.redhat.com/security/cve/CVE-2017-7407 https://curl.haxx.se/docs/adv_20170403.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407 https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13 https://security.gentoo.org/glsa/201709-14 https://ubuntu.com/security/notices/USN-3441-1 https://ubuntu.com/security/notices/USN-3441-2
|
| libcurl | CVE-2018-20483 | LOW | 7.29.0-54.el7 | | Expand...http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS http://www.securityfocus.com/bid/106358 https://access.redhat.com/errata/RHSA-2019:3701 https://access.redhat.com/security/cve/CVE-2018-20483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483 https://linux.oracle.com/cve/CVE-2018-20483.html https://linux.oracle.com/errata/ELSA-2019-3701.html https://security.gentoo.org/glsa/201903-08 https://security.netapp.com/advisory/ntap-20190321-0002/ https://twitter.com/marcan42/status/1077676739877232640 https://ubuntu.com/security/notices/USN-3943-1 https://usn.ubuntu.com/3943-1/
|
| libcurl | CVE-2019-5436 | LOW | 7.29.0-54.el7 | 7.29.0-57.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html http://www.openwall.com/lists/oss-security/2019/09/11/6 https://access.redhat.com/security/cve/CVE-2019-5436 https://curl.haxx.se/docs/CVE-2019-5436.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436 https://linux.oracle.com/cve/CVE-2019-5436.html https://linux.oracle.com/errata/ELSA-2020-1792.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/ https://seclists.org/bugtraq/2020/Feb/36 https://security.gentoo.org/glsa/202003-29 https://security.netapp.com/advisory/ntap-20190606-0004/ https://support.f5.com/csp/article/K55133295 https://support.f5.com/csp/article/K55133295?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-3993-1 https://ubuntu.com/security/notices/USN-3993-2 https://www.debian.org/security/2020/dsa-4633 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libcurl | CVE-2020-8231 | LOW | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-8231 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.haxx.se/docs/CVE-2020-8231.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231 https://hackerone.com/reports/948876 https://linux.oracle.com/cve/CVE-2020-8231.html https://linux.oracle.com/errata/ELSA-2021-1610.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-8231 https://security.gentoo.org/glsa/202012-14 https://ubuntu.com/security/notices/USN-4466-1 https://ubuntu.com/security/notices/USN-4466-2 https://ubuntu.com/security/notices/USN-4665-1 https://www.debian.org/security/2021/dsa-4881 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libcurl | CVE-2021-22898 | LOW | 7.29.0-54.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/07/21/4 https://access.redhat.com/security/cve/CVE-2021-22898 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://curl.se/docs/CVE-2021-22898.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898 https://errata.almalinux.org/8/ALSA-2021-4511.html https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde https://hackerone.com/reports/1176461 https://linux.oracle.com/cve/CVE-2021-22898.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/ https://nvd.nist.gov/vuln/detail/CVE-2021-22898 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html
|
| libcurl | CVE-2021-22925 | LOW | 7.29.0-54.el7 | | Expand...http://seclists.org/fulldisclosure/2021/Sep/39 http://seclists.org/fulldisclosure/2021/Sep/40 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json https://access.redhat.com/security/cve/CVE-2021-22925 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf https://curl.se/docs/CVE-2021-22925.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22925 https://errata.almalinux.org/8/ALSA-2021-4511.html https://hackerone.com/reports/1223882 https://linux.oracle.com/cve/CVE-2021-22925.html https://linux.oracle.com/errata/ELSA-2021-4511.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/ https://nvd.nist.gov/vuln/detail/CVE-2021-22925 https://security.netapp.com/advisory/ntap-20210902-0003/ https://support.apple.com/kb/HT212804 https://support.apple.com/kb/HT212805 https://ubuntu.com/security/notices/USN-5021-1 https://ubuntu.com/security/notices/USN-5021-2 https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libcurl | CVE-2022-27781 | LOW | 7.29.0-54.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27781 https://curl.se/docs/CVE-2022-27781.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781 https://github.com/curl/curl/commit/f6c335d63f https://hackerone.com/reports/1555441 https://nvd.nist.gov/vuln/detail/CVE-2022-27781 https://security.netapp.com/advisory/ntap-20220609-0009/ https://ubuntu.com/security/notices/USN-5412-1
|
| libdb | CVE-2017-10140 | MEDIUM | 5.3.21-25.el7 | | Expand...http://seclists.org/oss-sec/2017/q3/285 http://www.openwall.com/lists/oss-security/2017/08/12/1 http://www.postfix.org/announcements/postfix-3.2.2.html https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/security/cve/CVE-2017-10140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140 https://ubuntu.com/security/notices/USN-3489-1 https://ubuntu.com/security/notices/USN-3489-2 https://www.oracle.com/security-alerts/cpujul2020.html
|
| libdb | CVE-2019-2708 | LOW | 5.3.21-25.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://access.redhat.com/security/cve/CVE-2019-2708 https://linux.oracle.com/cve/CVE-2019-2708.html https://linux.oracle.com/errata/ELSA-2021-1675.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/ https://nvd.nist.gov/vuln/detail/CVE-2019-2708
|
| libdb-utils | CVE-2017-10140 | MEDIUM | 5.3.21-25.el7 | | Expand...http://seclists.org/oss-sec/2017/q3/285 http://www.openwall.com/lists/oss-security/2017/08/12/1 http://www.postfix.org/announcements/postfix-3.2.2.html https://access.redhat.com/errata/RHSA-2019:0366 https://access.redhat.com/security/cve/CVE-2017-10140 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10140 https://ubuntu.com/security/notices/USN-3489-1 https://ubuntu.com/security/notices/USN-3489-2 https://www.oracle.com/security-alerts/cpujul2020.html
|
| libdb-utils | CVE-2019-2708 | LOW | 5.3.21-25.el7 | | Expand...http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://access.redhat.com/security/cve/CVE-2019-2708 https://linux.oracle.com/cve/CVE-2019-2708.html https://linux.oracle.com/errata/ELSA-2021-1675.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQFKX6NKU2DCW5CTCHQSOJJDFVRVTPO6/ https://nvd.nist.gov/vuln/detail/CVE-2019-2708
|
| libgcc | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| libgcc | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| libgcc | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| libgcc | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libgcc | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libgcc | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| libgcc | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libgcc | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libgcc | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| libgcc | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libgcc | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| libgcc | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| libgcc | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| libgcc | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| libgcc | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgcc | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgcc | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgcc | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgcc | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgcc | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgcc | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgcc | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| libgcc | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| libgcc | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| libgcrypt | CVE-2014-5270 | MEDIUM | 1.5.3-14.el7 | | Expand...http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html http://openwall.com/lists/oss-security/2014/08/16/2 http://www.cs.tau.ac.il/~tromer/handsoff/ http://www.debian.org/security/2014/dsa-3024 http://www.debian.org/security/2014/dsa-3073 https://access.redhat.com/security/cve/CVE-2014-5270 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270 https://ubuntu.com/security/notices/USN-2339-1 https://ubuntu.com/security/notices/USN-2339-2
|
| libgcrypt | CVE-2017-7526 | MEDIUM | 1.5.3-14.el7 | | Expand...http://www.securityfocus.com/bid/99338 http://www.securitytracker.com/id/1038915 https://access.redhat.com/security/cve/CVE-2017-7526 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7526 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7526 https://eprint.iacr.org/2017/627 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=78130828e9a140a9de4dafadbc844dbb64cb709a https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=8725c99ffa41778f382ca97233183bcd687bb0ce https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=e6a3dc9900433bbc8ad362a595a3837318c28fa9 https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html https://ubuntu.com/security/notices/USN-3347-1 https://ubuntu.com/security/notices/USN-3347-2 https://ubuntu.com/security/notices/USN-3733-1 https://ubuntu.com/security/notices/USN-3733-2 https://usn.ubuntu.com/3733-1/ https://usn.ubuntu.com/3733-2/ https://www.debian.org/security/2017/dsa-3901 https://www.debian.org/security/2017/dsa-3960
|
| libgcrypt | CVE-2019-12904 | MEDIUM | 1.5.3-14.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00049.html https://access.redhat.com/security/cve/CVE-2019-12904 https://dev.gnupg.org/T4541 https://github.com/gpg/libgcrypt/commit/a4c561aab1014c3630bc88faf6f5246fee16b020 https://github.com/gpg/libgcrypt/commit/daedbbb5541cd8ecda1459d3b843ea4d92788762 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-12904.html
|
| libgcrypt | CVE-2021-33560 | MEDIUM | 1.5.3-14.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33560.json https://access.redhat.com/security/cve/CVE-2021-33560 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560 https://dev.gnupg.org/T5305 https://dev.gnupg.org/T5328 https://dev.gnupg.org/T5466 https://dev.gnupg.org/rCe8b7f10be275bcedb5fc05ed4837a89bfd605c61 https://eprint.iacr.org/2021/923 https://errata.almalinux.org/8/ALSA-2021-4409.html https://linux.oracle.com/cve/CVE-2021-33560.html https://linux.oracle.com/errata/ELSA-2022-9263.html https://lists.debian.org/debian-lts-announce/2021/06/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BKKTOIGFW2SGN3DO2UHHVZ7MJSYN4AAB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7OAPCUGPF3VLA7QAJUQSL255D4ITVTL/ https://nvd.nist.gov/vuln/detail/CVE-2021-33560 https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libgcrypt | CVE-2021-40528 | MEDIUM | 1.5.3-14.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-40528 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40528 https://dev.gnupg.org/rCb118681ebc4c9ea4b9da79b0f9541405a64f4c13 https://eprint.iacr.org/2021/923 https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commit;h=3462280f2e23e16adf3ed5176e0f2413d8861320 https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1 https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2 https://nvd.nist.gov/vuln/detail/CVE-2021-40528 https://ubuntu.com/security/notices/USN-5080-1 https://ubuntu.com/security/notices/USN-5080-2
|
| libgcrypt | CVE-2014-3591 | LOW | 1.5.3-14.el7 | | Expand...http://www.cs.tau.ac.il/~tromer/radioexp/ http://www.debian.org/security/2015/dsa-3184 http://www.debian.org/security/2015/dsa-3185 https://access.redhat.com/security/cve/CVE-2014-3591 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591 https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html https://ubuntu.com/security/notices/USN-2554-1 https://ubuntu.com/security/notices/USN-2555-1
|
| libgcrypt | CVE-2015-0837 | LOW | 1.5.3-14.el7 | | Expand...http://www.debian.org/security/2015/dsa-3184 http://www.debian.org/security/2015/dsa-3185 https://access.redhat.com/security/cve/CVE-2015-0837 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837 https://ieeexplore.ieee.org/document/7163050 https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000363.html https://lists.gnupg.org/pipermail/gnupg-announce/2015q1/000364.html https://ubuntu.com/security/notices/USN-2554-1 https://ubuntu.com/security/notices/USN-2555-1
|
| libgfortran | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| libgfortran | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| libgfortran | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| libgfortran | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libgfortran | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libgfortran | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| libgfortran | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libgfortran | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libgfortran | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| libgfortran | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libgfortran | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| libgfortran | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| libgfortran | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| libgfortran | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| libgfortran | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgfortran | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgfortran | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgfortran | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgfortran | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgfortran | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgfortran | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgfortran | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| libgfortran | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| libgfortran | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| libgomp | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| libgomp | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| libgomp | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| libgomp | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libgomp | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libgomp | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| libgomp | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libgomp | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libgomp | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| libgomp | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libgomp | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| libgomp | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| libgomp | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| libgomp | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| libgomp | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgomp | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgomp | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgomp | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgomp | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgomp | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgomp | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libgomp | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| libgomp | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| libgomp | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| libidn | CVE-2015-2059 | LOW | 1.28-4.el7 | | Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279 http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3578 http://www.openwall.com/lists/oss-security/2015/02/23/25 http://www.securityfocus.com/bid/72736 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2015-2059 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059 https://github.com/jabberd2/jabberd2/issues/85 https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00026.html (regression) https://ubuntu.com/security/notices/USN-3068-1
|
| libidn | CVE-2015-8948 | LOW | 1.28-4.el7 | | Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=570e68886c41c2e765e6218cb317d9a9a447a041 http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3658 http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2015-8948 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://marc.info/?l=oss-security&m=146910769415616&w=2 https://ubuntu.com/security/notices/USN-3068-1
|
| libidn | CVE-2016-6261 | LOW | 1.28-4.el7 | | Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=f20ce1128fb7f4d33297eee307dddaf0f92ac72d http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3658 http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2016-6261 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6261 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2015-07/msg00016.html https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://ubuntu.com/security/notices/USN-3068-1
|
| libidn | CVE-2016-6262 | LOW | 1.28-4.el7 | | Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=5e3cb9c7b5bf0ce665b9d68f5ddf095af5c9ba60 http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2016-6262 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://ubuntu.com/security/notices/USN-3068-1
|
| libidn | CVE-2016-6263 | LOW | 1.28-4.el7 | | Expand...http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=1fbee57ef3c72db2206dd87e4162108b2f425555 http://lists.opensuse.org/opensuse-updates/2016-08/msg00005.html http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html http://www.debian.org/security/2016/dsa-3658 http://www.openwall.com/lists/oss-security/2016/07/20/6 http://www.openwall.com/lists/oss-security/2016/07/21/4 http://www.securityfocus.com/bid/92070 http://www.ubuntu.com/usn/USN-3068-1 https://access.redhat.com/security/cve/CVE-2016-6263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.gnu.org/archive/html/help-libidn/2016-07/msg00009.html https://security.gentoo.org/glsa/201908-06 https://ubuntu.com/security/notices/USN-3068-1
|
| libidn | CVE-2017-14062 | LOW | 1.28-4.el7 | | Expand...http://www.debian.org/security/2017/dsa-3988 https://access.redhat.com/security/cve/CVE-2017-14062 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14062 https://gitlab.com/libidn/libidn2/blob/master/NEWS https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd https://lists.debian.org/debian-lts-announce/2018/07/msg00040.html https://ubuntu.com/security/notices/USN-3421-1 https://ubuntu.com/security/notices/USN-3434-1 https://ubuntu.com/security/notices/USN-3434-2
|
| libkadm5 | CVE-2014-5351 | MEDIUM | 1.15.1-46.el7 | | Expand...http://advisories.mageia.org/MGASA-2014-0477.html http://krbdev.mit.edu/rt/Ticket/Display.html?id=8018 http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140132.html http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151103.html http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00016.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00044.html http://security.gentoo.org/glsa/glsa-201412-53.xml http://www.mandriva.com/security/advisories?name=MDVSA-2014:224 http://www.securityfocus.com/bid/70380 http://www.securitytracker.com/id/1031003 http://www.ubuntu.com/usn/USN-2498-1 https://access.redhat.com/security/cve/CVE-2014-5351 https://bugzilla.redhat.com/show_bug.cgi?id=1145425 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351 https://exchange.xforce.ibmcloud.com/vulnerabilities/97028 https://github.com/krb5/krb5/commit/af0ed4df4dfae762ab5fb605f5a0c8f59cb4f6ca https://lists.debian.org/debian-lts-announce/2018/01/msg00040.html https://ubuntu.com/security/notices/USN-2498-1
|
| libkadm5 | CVE-2015-2695 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/90687 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695 https://github.com/krb5/krb5/commit/b51b33f2bc5d1497ddf5bd107f791c101695000d https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| libkadm5 | CVE-2015-2696 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8244 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.securityfocus.com/bid/90675 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2696 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696 https://github.com/krb5/krb5/commit/e04f0283516e80d2f93366e0d479d13c9b5c8c2a https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| libkadm5 | CVE-2015-2697 | MEDIUM | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8252 http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00022.html http://www.debian.org/security/2015/dsa-3395 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.securityfocus.com/bid/77581 http://www.securitytracker.com/id/1034084 http://www.ubuntu.com/usn/USN-2810-1 https://access.redhat.com/security/cve/CVE-2015-2697 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697 https://github.com/krb5/krb5/commit/f0c094a1b745d91ef2f9a4eae2149aac026a5789 https://security.gentoo.org/glsa/201611-14 https://ubuntu.com/security/notices/USN-2810-1
|
| libkadm5 | CVE-2017-15088 | MEDIUM | 1.15.1-46.el7 | | Expand...http://www.securityfocus.com/bid/101594 https://access.redhat.com/security/cve/CVE-2017-15088 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698 https://bugzilla.redhat.com/show_bug.cgi?id=1504045 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15088 https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4 https://github.com/krb5/krb5/pull/707
|
| libkadm5 | CVE-2020-17049 | MEDIUM | 1.15.1-46.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/10/3 https://access.redhat.com/security/cve/CVE-2020-17049 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17049
|
| libkadm5 | CVE-2020-28196 | MEDIUM | 1.15.1-46.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28196 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28196 https://github.com/krb5/krb5/commit/57415dda6cf04e73ffc3723be518eddfae599bfd https://linux.oracle.com/cve/CVE-2020-28196.html https://linux.oracle.com/errata/ELSA-2021-9294.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45KKOZQWIIIW5C45PJVGQ32AXBSYNBE7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73IGOG6CZAVMVNS4GGRMOLOZ7B6QVA7F/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPH2V3WSQTELROZK3GFCPQDOFLKIZ6H5/ https://nvd.nist.gov/vuln/detail/CVE-2020-28196 https://security.gentoo.org/glsa/202011-17 https://security.netapp.com/advisory/ntap-20201202-0001/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://ubuntu.com/security/notices/USN-4635-1 https://www.debian.org/security/2020/dsa-4795 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html
|
| libkadm5 | CVE-2021-36222 | MEDIUM | 1.15.1-46.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36222 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36222 https://github.com/krb5/krb5/commit/fc98f520caefff2e5ee9a0026fdf5109944b3562 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-36222.html https://linux.oracle.com/errata/ELSA-2021-3576.html https://nvd.nist.gov/vuln/detail/CVE-2021-36222 https://security.netapp.com/advisory/ntap-20211022-0003/ https://security.netapp.com/advisory/ntap-20211104-0007/ https://web.mit.edu/kerberos/advisories/ https://www.debian.org/security/2021/dsa-4944 https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libkadm5 | CVE-2021-37750 | MEDIUM | 1.15.1-46.el7 | 1.15.1-51.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37750.json https://access.redhat.com/security/cve/CVE-2021-37750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750 https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49 https://github.com/krb5/krb5/releases https://linux.oracle.com/cve/CVE-2021-37750.html https://linux.oracle.com/errata/ELSA-2021-4788.html https://lists.debian.org/debian-lts-announce/2021/09/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MFCLW7D46E4VCREKKH453T5DA4XOLHU2/ https://nvd.nist.gov/vuln/detail/CVE-2021-37750 https://security.netapp.com/advisory/ntap-20210923-0002/ https://web.mit.edu/kerberos/advisories/
|
| libkadm5 | CVE-2017-11462 | LOW | 1.15.1-46.el7 | | Expand...http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598 https://access.redhat.com/security/cve/CVE-2017-11462 https://bugzilla.redhat.com/show_bug.cgi?id=1488873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11462 https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FPRUP4YVOEBGEROUYWZFEQ64HTMGNED/
|
| libmount | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html http://www.openwall.com/lists/oss-security/2014/11/26/13 http://www.openwall.com/lists/oss-security/2014/11/26/21 http://www.securityfocus.com/bid/71327 https://access.redhat.com/security/cve/CVE-2014-9114 https://bugzilla.redhat.com/show_bug.cgi?id=1168485 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114 https://exchange.xforce.ibmcloud.com/vulnerabilities/98993 https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201612-14
|
| libmount | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1 http://www.openwall.com/lists/oss-security/2016/02/27/2 https://access.redhat.com/security/cve/CVE-2016-2779 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
|
| libmount | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0563 https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.netapp.com/advisory/ntap-20220331-0002/
|
| libmount | CVE-2015-5218 | LOW | 2.23.2-61.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html http://www.spinics.net/lists/util-linux-ng/msg11873.html https://access.redhat.com/security/cve/CVE-2015-5218 https://bugzilla.redhat.com/show_bug.cgi?id=1259322 https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8 https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| libmount | CVE-2021-37600 | LOW | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://nvd.nist.gov/vuln/detail/CVE-2021-37600 https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libpng | CVE-2015-8540 | LOW | 2:1.5.13-8.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174435.html http://sourceforge.net/p/libpng/bugs/244/ http://sourceforge.net/p/libpng/code/ci/d9006f683c641793252d92254a75ae9b815b42ed/ http://sourceforge.net/projects/libpng/files/libpng10/1.0.66/ http://sourceforge.net/projects/libpng/files/libpng12/1.2.56/ http://sourceforge.net/projects/libpng/files/libpng14/1.4.19/ http://sourceforge.net/projects/libpng/files/libpng15/1.5.26/ http://www.debian.org/security/2016/dsa-3443 http://www.openwall.com/lists/oss-security/2015/12/10/6 http://www.openwall.com/lists/oss-security/2015/12/10/7 http://www.openwall.com/lists/oss-security/2015/12/11/1 http://www.openwall.com/lists/oss-security/2015/12/11/2 http://www.openwall.com/lists/oss-security/2015/12/17/10 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/80592 https://access.redhat.com/errata/RHSA-2016:1430 https://access.redhat.com/security/cve/CVE-2015-8540 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201611-08 https://ubuntu.com/security/notices/USN-2861-1
|
| libpng | CVE-2016-10087 | LOW | 2:1.5.13-8.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/12/29/2 http://www.openwall.com/lists/oss-security/2016/12/30/4 http://www.securityfocus.com/bid/95157 https://access.redhat.com/security/cve/CVE-2016-10087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-74 https://sourceforge.net/p/libpng/code/ci/243d4e5f3fe71740d52a53cf3dd77cc83a3430ba https://sourceforge.net/p/libpng/code/ci/794a15fad6add4d636369d0b46f603a02995b2e2/ (libpng12) https://sourceforge.net/p/libpng/code/ci/812768d7a9c973452222d454634496b25ed415eb (libpng16) https://ubuntu.com/security/notices/USN-3712-1 https://ubuntu.com/security/notices/USN-3712-2 https://usn.ubuntu.com/3712-1/ https://usn.ubuntu.com/3712-2/
|
| libquadmath | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| libquadmath | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| libquadmath | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| libquadmath | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libquadmath | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libquadmath | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| libquadmath | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libquadmath | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libquadmath | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| libquadmath | CVE-2021-3114 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3114 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3114 https://github.com/golang/go/commit/d95ca9138026cbe40e0857d76a81a16d03230871 https://groups.google.com/g/golang-announce/c/mperVMGa98w https://linux.oracle.com/cve/CVE-2021-3114.html https://linux.oracle.com/errata/ELSA-2021-4226.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YWAYJGXWC232SG3UR3TR574E6BP3OSQQ/ https://nvd.nist.gov/vuln/detail/CVE-2021-3114 https://security.netapp.com/advisory/ntap-20210219-0001/ https://www.debian.org/security/2021/dsa-4848
|
| libquadmath | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libquadmath | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| libquadmath | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| libquadmath | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| libquadmath | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| libquadmath | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libquadmath | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libquadmath | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libquadmath | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libquadmath | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libquadmath | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libquadmath | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libquadmath | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| libquadmath | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| libquadmath | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| libsepol | CVE-2021-36084 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36084 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml https://linux.oracle.com/cve/CVE-2021-36084.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol | CVE-2021-36085 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36085 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml https://linux.oracle.com/cve/CVE-2021-36085.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol | CVE-2021-36086 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36086 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml https://linux.oracle.com/cve/CVE-2021-36086.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol | CVE-2021-36087 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36087 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml https://linux.oracle.com/cve/CVE-2021-36087.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/ https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol-devel | CVE-2021-36084 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36084 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31065 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36084 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/f34d3d30c8325e4847a6b696fe7a3936a8a361f3 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-417.yaml https://linux.oracle.com/cve/CVE-2021-36084.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol-devel | CVE-2021-36085 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36085 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=31124 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36085 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/2d35fcc7e9e976a2346b1de20e54f8663e8a6cba https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-421.yaml https://linux.oracle.com/cve/CVE-2021-36085.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol-devel | CVE-2021-36086 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36086 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32177 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36086 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/c49a8ea09501ad66e799ea41b8154b6770fec2c8 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-536.yaml https://linux.oracle.com/cve/CVE-2021-36086.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://ubuntu.com/security/notices/USN-5391-1
|
| libsepol-devel | CVE-2021-36087 | MEDIUM | 2.5-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-36087 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=32675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36087 https://errata.almalinux.org/8/ALSA-2021-4513.html https://github.com/SELinuxProject/selinux/commit/340f0eb7f3673e8aacaf0a96cbfcd4d12a405521 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/selinux/OSV-2021-585.yaml https://linux.oracle.com/cve/CVE-2021-36087.html https://linux.oracle.com/errata/ELSA-2021-4513.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U7ZYR3PIJ75N6U2IONJWCKZ5L2NKJTGR/ https://lore.kernel.org/selinux/CAEN2sdqJKHvDzPnxS-J8grU8fSf32DDtx=kyh84OsCq_Vm+yaQ@mail.gmail.com/T/ https://ubuntu.com/security/notices/USN-5391-1
|
| libssh2 | CVE-2019-13115 | MEDIUM | 1.8.0-3.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-13115 https://blog.semmle.com/libssh2-integer-overflow/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13115 https://github.com/libssh2/libssh2/compare/02ecf17...42d37aa https://github.com/libssh2/libssh2/pull/350 https://libssh2.org/changes.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6LUNHPW64IGCASZ4JQ2J5KDXNZN53DWW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M7IF3LNHOA75O4WZWIHJLIRMA5LJUED3/ https://security.netapp.com/advisory/ntap-20190806-0002/ https://support.f5.com/csp/article/K13322484 https://support.f5.com/csp/article/K13322484?utm_source=f5support&utm_medium=RSS
|
| libssh2 | CVE-2019-17498 | MEDIUM | 1.8.0-3.el7 | 1.8.0-4.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00026.html https://access.redhat.com/security/cve/CVE-2019-17498 https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498 https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498 https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480 https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94 https://linux.oracle.com/cve/CVE-2019-17498.html https://linux.oracle.com/errata/ELSA-2020-3915.html https://lists.debian.org/debian-lts-announce/2019/11/msg00010.html https://lists.debian.org/debian-lts-announce/2021/12/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TY7EEE34RFKCTXTMBQQWWSLXZWSCXNDB/ https://nvd.nist.gov/vuln/detail/CVE-2019-17498
|
| libssh2 | CVE-2019-3859 | MEDIUM | 1.8.0-3.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00103.html http://packetstormsecurity.com/files/152136/Slackware-Security-Advisory-libssh2-Updates.html http://www.openwall.com/lists/oss-security/2019/03/18/3 http://www.securityfocus.com/bid/107485 https://access.redhat.com/security/cve/CVE-2019-3859 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3859 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3859 https://github.com/libssh2/libssh2/pull/315 https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html https://lists.debian.org/debian-lts-announce/2019/04/msg00006.html https://lists.debian.org/debian-lts-announce/2019/07/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCWEA5ZCLKRDUK62QVVYMFWLWKOPX3LO/ https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00102.html https://seclists.org/bugtraq/2019/Apr/25 https://seclists.org/bugtraq/2019/Mar/25 https://security.netapp.com/advisory/ntap-20190327-0005/ https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-767 https://www.debian.org/security/2019/dsa-4431 https://www.libssh2.org/CVE-2019-3859.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libssh2 | CVE-2019-3860 | MEDIUM | 1.8.0-3.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00072.html https://access.redhat.com/security/cve/CVE-2019-3860 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3860 https://github.com/libssh2/libssh2/pull/316 https://libssh2.org/CVE-2019-3860.html https://lists.debian.org/debian-lts-announce/2019/03/msg00032.html https://lists.debian.org/debian-lts-announce/2019/07/msg00028.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DK6VO2CEUTAJFYIKWNZKEKYMYR3NO2O/ https://seclists.org/bugtraq/2019/Apr/25 https://security.netapp.com/advisory/ntap-20190327-0005/ https://www.debian.org/security/2019/dsa-4431 https://www.libssh2.org/CVE-2019-3860.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| libstdc++ | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| libstdc++ | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| libstdc++ | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| libstdc++ | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libstdc++ | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libstdc++ | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| libstdc++ | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libstdc++ | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libstdc++ | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| libstdc++ | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libstdc++ | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| libstdc++ | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| libstdc++ | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| libstdc++ | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| libstdc++ | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++ | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++ | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++ | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++ | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++ | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++ | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++ | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| libstdc++ | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| libstdc++ | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| libstdc++-devel | CVE-2014-5044 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2014/07/23/7 http://www.openwall.com/lists/oss-security/2014/07/24/1 http://www.openwall.com/lists/oss-security/2014/07/31/6 https://access.redhat.com/security/cve/CVE-2014-5044 https://bugzilla.redhat.com/show_bug.cgi?id=1122812 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044 https://exchange.xforce.ibmcloud.com/vulnerabilities/94849 https://gcc.gnu.org/viewcvs/gcc/trunk/libgfortran/ChangeLog?limit_changes=0&view=markup&pathrev=211721 https://gcc.gnu.org/viewcvs/gcc?limit_changes=0&view=revision&revision=211721
|
| libstdc++-devel | CVE-2018-20673 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106454 https://access.redhat.com/security/cve/CVE-2018-20673 https://linux.oracle.com/cve/CVE-2018-20673.html https://linux.oracle.com/errata/ELSA-2021-4386.html https://sourceware.org/bugzilla/show_bug.cgi?id=24039
|
| libstdc++-devel | CVE-2019-16276 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00043.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00044.html https://access.redhat.com/errata/RHSA-2020:0101 https://access.redhat.com/errata/RHSA-2020:0329 https://access.redhat.com/errata/RHSA-2020:0652 https://access.redhat.com/security/cve/CVE-2019-16276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16276 https://github.com/golang/go/commit/5a6ab1ec3e678640befebeb3318b746a64ad986c (golang-1.13) https://github.com/golang/go/commit/6e6f4aaf70c8b1cc81e65a26332aa9409de03ad8 (golang-1.12) https://github.com/golang/go/issues/34540 https://groups.google.com/forum/#!msg/golang-announce/cszieYyuL9Q/g4Z7pKaqAgAJ https://groups.google.com/forum/m/#!topic/golang-announce/cszieYyuL9Q https://linux.oracle.com/cve/CVE-2019-16276.html https://linux.oracle.com/errata/ELSA-2020-0329.html https://lists.debian.org/debian-lts-announce/2021/03/msg00014.html https://lists.debian.org/debian-lts-announce/2021/03/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LULL72EUUKIY4NWDZVJVN2LIB4MXHS5P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7GMJ3VXF5RXK2C7CL66KJ6XOOTOL5BJ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q5MD2F7ATWSTB45ZJIPJHBAAHVRGRAKG/ https://security.netapp.com/advisory/ntap-20191122-0004/
|
| libstdc++-devel | CVE-2020-16845 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00030.html https://access.redhat.com/security/cve/CVE-2020-16845 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16845 https://github.com/advisories/GHSA-q6gq-997w-f55g https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b https://github.com/ulikunitz/xz/issues/35 https://groups.google.com/forum/#!topic/golang-announce/NyPIaucMgXo https://groups.google.com/forum/#!topic/golang-announce/_ulYYcIWg3Q https://groups.google.com/g/golang-announce/c/NyPIaucMgXo https://linux.oracle.com/cve/CVE-2020-16845.html https://linux.oracle.com/errata/ELSA-2020-5828.html https://lists.debian.org/debian-lts-announce/2020/11/msg00037.html https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6RCFJTMKHY5ICGEM5BUFUEDDGSPJ25XU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWRBAH4UZJO3RROQ72SYCUPFCJFA22FO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TACQFZDPA7AUR6TRZBCX2RGRFSDYLI7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WV2VWKFTH4EJGZBZALVUJQJOAQB5MDQ4/ https://nvd.nist.gov/vuln/detail/CVE-2020-16845 https://security.netapp.com/advisory/ntap-20200924-0002/ https://www.debian.org/security/2021/dsa-4848 https://www.oracle.com/security-alerts/cpuApr2021.html
|
| libstdc++-devel | CVE-2020-24553 | MEDIUM | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00002.html http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html http://seclists.org/fulldisclosure/2020/Sep/5 https://access.redhat.com/security/cve/CVE-2020-24553 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24553 https://groups.google.com/forum/#!topic/golang-announce/8wqlSbkLdPs https://linux.oracle.com/cve/CVE-2020-24553.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CZBO7Q73GGWBVYIKNH2HNN44Q5IQND5W/ https://nvd.nist.gov/vuln/detail/CVE-2020-24553 https://security.netapp.com/advisory/ntap-20200924-0003/ https://ubuntu.com/security/notices/USN-4758-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.redteam-pentesting.de/advisories/rt-sa-2020-004 https://www.redteam-pentesting.de/en/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
|
| libstdc++-devel | CVE-2020-28362 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28362 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://groups.google.com/g/golang-nuts/c/c-ssaaS7RMI https://linux.oracle.com/cve/CVE-2020-28362.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28362 https://security.netapp.com/advisory/ntap-20201202-0004/ https://www.arista.com/en/support/advisories-notices/security-advisories/12166-security-advisory-62
|
| libstdc++-devel | CVE-2020-28366 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28366 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28366 https://github.com/golang/go/issues/42559 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28366.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28366 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libstdc++-devel | CVE-2020-28367 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-28367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28367 https://github.com/golang/go/issues/42556 https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM/m/fLguyiM2CAAJ https://linux.oracle.com/cve/CVE-2020-28367.html https://linux.oracle.com/errata/ELSA-2020-5493.html https://lists.apache.org/thread.html/rd02e75766cd333a0df417588460f5e4477060633000bfe94955851fd@%3Cissues.trafficcontrol.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/11/msg00038.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2W4COUPL3YVTZ6RTEIT6LPBDJUFF3VSP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3ZSHGNTJWCWYAKY5OLZS2XQQYHSXSUO/ https://nvd.nist.gov/vuln/detail/CVE-2020-28367 https://security.netapp.com/advisory/ntap-20201202-0004/
|
| libstdc++-devel | CVE-2021-27918 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27918 https://groups.google.com/g/golang-announce/c/MfiLYjG-RAw https://linux.oracle.com/cve/CVE-2021-27918.html https://linux.oracle.com/errata/ELSA-2021-9268.html https://nvd.nist.gov/vuln/detail/CVE-2021-27918
|
| libstdc++-devel | CVE-2021-42574 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/4 http://www.openwall.com/lists/oss-security/2021/11/01/5 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.openwall.com/lists/oss-security/2021/11/02/10 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42574 https://linux.oracle.com/cve/CVE-2021-42574.html https://linux.oracle.com/errata/ELSA-2021-4743.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/ https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr31/ https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Bidirectional_Text_Spoofing https://www.unicode.org/reports/tr39/ https://www.unicode.org/reports/tr9/tr9-44.html#HL4
|
| libstdc++-devel | CVE-2021-42694 | MEDIUM | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/11/01/1 http://www.openwall.com/lists/oss-security/2021/11/01/6 http://www.unicode.org/versions/Unicode14.0.0/ https://access.redhat.com/security/cve/CVE-2021-42694 https://cwe.mitre.org/data/definitions/1007.html https://trojansource.codes https://trojansource.codes/ https://www.kb.cert.org/vuls/id/999008 https://www.lightbluetouchpaper.org/2021/11/01/trojan-source-invisible-vulnerabilities/ https://www.scyon.nl/post/trojans-in-your-source-code https://www.unicode.org/reports/tr36/ https://www.unicode.org/reports/tr36/#Canonical_Represenation https://www.unicode.org/reports/tr39/
|
| libstdc++-devel | CVE-2022-27943 | MEDIUM | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-27943 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039 https://sourceware.org/bugzilla/show_bug.cgi?id=28995
|
| libstdc++-devel | CVE-2015-5276 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00054.html http://lists.opensuse.org/opensuse-updates/2016-04/msg00052.html http://www.securitytracker.com/id/1034375 https://access.redhat.com/security/cve/CVE-2015-5276 https://bugzilla.redhat.com/show_bug.cgi?id=1262846 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5276 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65142 https://gcc.gnu.org/ml/gcc-patches/2015-09/msg01050.html
|
| libstdc++-devel | CVE-2016-2226 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90103 https://access.redhat.com/security/cve/CVE-2016-2226 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2226 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69687 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2 https://www.exploit-db.com/exploits/42386/
|
| libstdc++-devel | CVE-2016-4487 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4487 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4487 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++-devel | CVE-2016-4488 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90025 https://access.redhat.com/security/cve/CVE-2016-4488 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4488 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70481 https://gcc.gnu.org/ml/gcc-patches/2016-03/msg01687.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++-devel | CVE-2016-4489 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90017 https://access.redhat.com/security/cve/CVE-2016-4489 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4489 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70492 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++-devel | CVE-2016-4490 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90019 https://access.redhat.com/security/cve/CVE-2016-4490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4490 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70498 https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++-devel | CVE-2016-4491 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90016 https://access.redhat.com/security/cve/CVE-2016-4491 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4491 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70909 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00105.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++-devel | CVE-2016-4492 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4492 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++-devel | CVE-2016-4493 | LOW | 4.8.5-39.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/05/05/5 http://www.securityfocus.com/bid/90014 https://access.redhat.com/security/cve/CVE-2016-4493 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4493 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=70926 https://gcc.gnu.org/ml/gcc-patches/2016-05/msg00223.html https://ubuntu.com/security/notices/USN-3337-1 https://ubuntu.com/security/notices/USN-3367-1 https://ubuntu.com/security/notices/USN-3368-1 https://ubuntu.com/security/notices/USN-4336-2
|
| libstdc++-devel | CVE-2018-20657 | LOW | 4.8.5-39.el7 | | Expand...http://www.securityfocus.com/bid/106444 https://access.redhat.com/errata/RHSA-2019:3352 https://access.redhat.com/security/cve/CVE-2018-20657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20657 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=88539 https://linux.oracle.com/cve/CVE-2018-20657.html https://linux.oracle.com/errata/ELSA-2019-3352.html https://support.f5.com/csp/article/K62602089
|
| libstdc++-devel | CVE-2019-14250 | LOW | 4.8.5-39.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00057.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00078.html http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00004.html http://www.securityfocus.com/bid/109354 https://access.redhat.com/security/cve/CVE-2019-14250 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14250 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=90924 https://gcc.gnu.org/ml/gcc-patches/2019-07/msg01003.html https://nvd.nist.gov/vuln/detail/CVE-2019-14250 https://security.gentoo.org/glsa/202007-39 https://security.netapp.com/advisory/ntap-20190822-0002/ https://ubuntu.com/security/notices/USN-4326-1 https://ubuntu.com/security/notices/USN-4336-1 https://ubuntu.com/security/notices/USN-4336-2 https://usn.ubuntu.com/4326-1/ https://usn.ubuntu.com/4336-1/
|
| libstdc++-devel | CVE-2021-46195 | LOW | 4.8.5-39.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-46195 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103841
|
| libtasn1 | CVE-2016-4008 | MEDIUM | 4.10-1.el7 | | Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625 http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=f435825c0f527a8e52e6ffbc3ad0bc60531d537e http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html http://www.debian.org/security/2016/dsa-3568 http://www.openwall.com/lists/oss-security/2016/04/11/3 http://www.ubuntu.com/usn/USN-2957-1 http://www.ubuntu.com/usn/USN-2957-2 https://access.redhat.com/security/cve/CVE-2016-4008 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008 https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html https://security.gentoo.org/glsa/201703-05 https://ubuntu.com/security/notices/USN-2957-1 https://ubuntu.com/security/notices/USN-2957-2
|
| libtasn1 | CVE-2018-6003 | MEDIUM | 4.10-1.el7 | | Expand...http://git.savannah.nongnu.org/cgit/libtasn1.git/commit/?id=c593ae84cfcde8fea45787e53950e0ac71e9ca97 https://access.redhat.com/security/cve/CVE-2018-6003 https://bugzilla.redhat.com/show_bug.cgi?id=1535926 https://bugzilla.suse.com/show_bug.cgi?id=1076832 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003 https://gitlab.com/gnutls/libtasn1/commit/946565d8eb05fbf7970ea366e817581bb5a90910 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://ubuntu.com/security/notices/USN-3547-1 https://www.debian.org/security/2018/dsa-4106
|
| libtasn1 | CVE-2017-10790 | LOW | 4.10-1.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10790 https://bugzilla.redhat.com/show_bug.cgi?id=1464141 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/06/msg00026.html https://security.gentoo.org/glsa/201710-11 https://ubuntu.com/security/notices/USN-3547-1 https://usn.ubuntu.com/3547-1/ https://www.debian.org/security/2018/dsa-4106
|
| libtasn1 | CVE-2017-6891 | LOW | 4.10-1.el7 | | Expand...http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484 http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html http://www.debian.org/security/2017/dsa-3861 http://www.securityfocus.com/bid/98641 http://www.securitytracker.com/id/1038619 https://access.redhat.com/security/cve/CVE-2017-6891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://secuniaresearch.flexerasoftware.com/advisories/76125/ https://secuniaresearch.flexerasoftware.com/secunia_research/2017-11/ https://security.gentoo.org/glsa/201710-11 https://ubuntu.com/security/notices/USN-3309-1 https://ubuntu.com/security/notices/USN-3309-2
|
| libtasn1 | CVE-2018-1000654 | LOW | 4.10-1.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00018.html http://www.securityfocus.com/bid/105151 https://access.redhat.com/security/cve/CVE-2018-1000654 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654 https://gitlab.com/gnutls/libtasn1/issues/4 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://ubuntu.com/security/notices/USN-5352-1
|
| libuuid | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html http://www.openwall.com/lists/oss-security/2014/11/26/13 http://www.openwall.com/lists/oss-security/2014/11/26/21 http://www.securityfocus.com/bid/71327 https://access.redhat.com/security/cve/CVE-2014-9114 https://bugzilla.redhat.com/show_bug.cgi?id=1168485 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114 https://exchange.xforce.ibmcloud.com/vulnerabilities/98993 https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201612-14
|
| libuuid | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1 http://www.openwall.com/lists/oss-security/2016/02/27/2 https://access.redhat.com/security/cve/CVE-2016-2779 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
|
| libuuid | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0563 https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.netapp.com/advisory/ntap-20220331-0002/
|
| libuuid | CVE-2015-5218 | LOW | 2.23.2-61.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html http://www.spinics.net/lists/util-linux-ng/msg11873.html https://access.redhat.com/security/cve/CVE-2015-5218 https://bugzilla.redhat.com/show_bug.cgi?id=1259322 https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8 https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| libuuid | CVE-2021-37600 | LOW | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://nvd.nist.gov/vuln/detail/CVE-2021-37600 https://security.netapp.com/advisory/ntap-20210902-0002/
|
| libxml2 | CVE-2015-8035 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html http://rhn.redhat.com/errata/RHSA-2016-1089.html http://www.debian.org/security/2015/dsa-3430 http://www.openwall.com/lists/oss-security/2015/11/02/2 http://www.openwall.com/lists/oss-security/2015/11/02/4 http://www.openwall.com/lists/oss-security/2015/11/03/1 http://www.securityfocus.com/bid/77390 http://www.securitytracker.com/id/1034243 http://www.ubuntu.com/usn/USN-2812-1 http://xmlsoft.org/news.html https://access.redhat.com/security/cve/CVE-2015-8035 https://bugzilla.gnome.org/show_bug.cgi?id=757466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://linux.oracle.com/cve/CVE-2015-8035.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT206166 https://support.apple.com/HT206167 https://support.apple.com/HT206168 https://support.apple.com/HT206169 https://ubuntu.com/security/notices/USN-2812-1
|
| libxml2 | CVE-2016-4483 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.debian.org/security/2016/dsa-3593 http://www.openwall.com/lists/oss-security/2016/05/03/8 http://www.openwall.com/lists/oss-security/2016/05/04/7 http://www.openwall.com/lists/oss-security/2016/06/07/4 http://www.openwall.com/lists/oss-security/2016/06/07/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/90013 http://www.securitytracker.com/id/1036348 https://access.redhat.com/security/cve/CVE-2016-4483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483 https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-37 https://ubuntu.com/security/notices/USN-2994-1 https://www.tenable.com/security/tns-2016-18
|
| libxml2 | CVE-2016-4658 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7_9.6 | Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html http://www.securityfocus.com/bid/93054 http://www.securitytracker.com/id/1036858 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2016-4658 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658 https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b https://github.com/advisories/GHSA-fr52-4hqw-p27f https://github.com/sparklemotion/nokogiri/issues/1615 https://linux.oracle.com/cve/CVE-2016-4658.html https://linux.oracle.com/errata/ELSA-2021-3810.html https://nvd.nist.gov/vuln/detail/CVE-2016-4658 https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT207141 https://support.apple.com/HT207142 https://support.apple.com/HT207143 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3235-1
|
| libxml2 | CVE-2016-5131 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html http://rhn.redhat.com/errata/RHSA-2016-1485.html http://www.debian.org/security/2016/dsa-3637 http://www.securityfocus.com/bid/92053 http://www.securitytracker.com/id/1036428 http://www.securitytracker.com/id/1038623 http://www.ubuntu.com/usn/USN-3041-1 https://access.redhat.com/security/cve/CVE-2016-5131 https://bugzilla.redhat.com/show_bug.cgi?id=1358641 https://codereview.chromium.org/2127493002 https://crbug.com/623378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131 https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html https://linux.oracle.com/cve/CVE-2016-5131.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://security.gentoo.org/glsa/201610-09 https://security.gentoo.org/glsa/201701-37 https://source.android.com/security/bulletin/2017-05-01 https://support.apple.com/HT207141 https://support.apple.com/HT207142 https://support.apple.com/HT207143 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3041-1 https://ubuntu.com/security/notices/USN-3235-1
|
| libxml2 | CVE-2016-9318 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.securityfocus.com/bid/94347 https://access.redhat.com/security/cve/CVE-2016-9318 https://bugzilla.gnome.org/show_bug.cgi?id=772726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 https://github.com/lsh123/xmlsec/issues/43 https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
| libxml2 | CVE-2017-0663 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.securityfocus.com/bid/98877 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2017-0663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://source.android.com/security/bulletin/2017-06-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2 | CVE-2017-15412 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://www.securitytracker.com/id/1040348 https://access.redhat.com/errata/RHSA-2017:3401 https://access.redhat.com/errata/RHSA-2018:0287 https://access.redhat.com/security/cve/CVE-2017-15412 https://bugzilla.gnome.org/show_bug.cgi?id=783160 https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html https://crbug.com/727039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412 https://github.com/sparklemotion/nokogiri/issues/1714 https://linux.oracle.com/cve/CVE-2017-15412.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html https://security.gentoo.org/glsa/201801-03 https://ubuntu.com/security/notices/USN-3513-1 https://ubuntu.com/security/notices/USN-3513-2 https://usn.ubuntu.com/usn/usn-3513-1/ https://www.debian.org/security/2018/dsa-4086
|
| libxml2 | CVE-2017-16931 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://xmlsoft.org/news.html https://access.redhat.com/security/cve/CVE-2017-16931 https://bugzilla.gnome.org/show_bug.cgi?id=766956 https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3 https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
|
| libxml2 | CVE-2017-16932 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://xmlsoft.org/news.html https://access.redhat.com/security/cve/CVE-2017-16932 https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html https://bugzilla.gnome.org/show_bug.cgi?id=759579 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932 https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961 https://github.com/sparklemotion/nokogiri/issues/1714 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html https://ubuntu.com/security/notices/USN-3504-1 https://ubuntu.com/security/notices/USN-3504-2 https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/usn/usn-3504-1/
|
| libxml2 | CVE-2017-7375 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.securityfocus.com/bid/98877 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2017-7375 https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa https://bugzilla.redhat.com/show_bug.cgi?id=1462203 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375 https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e https://security.gentoo.org/glsa/201711-01 https://source.android.com/security/bulletin/2017-06-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2 https://www.debian.org/security/2017/dsa-3952
|
| libxml2 | CVE-2017-9047 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98599 https://access.redhat.com/security/cve/CVE-2017-9047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2 | CVE-2017-9049 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98601 https://access.redhat.com/security/cve/CVE-2017-9049 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2 | CVE-2017-9050 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98568 https://access.redhat.com/security/cve/CVE-2017-9050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050 https://github.com/advisories/GHSA-8c56-cpmw-89x7 https://github.com/sparklemotion/nokogiri/issues/1673 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-9050 https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-0663.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7375.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7376.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9047.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9048.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9049.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2 https://usn.ubuntu.com/usn/usn-3424-1/
|
| libxml2 | CVE-2018-14404 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/security/cve/CVE-2018-14404 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817 https://bugzilla.redhat.com/show_bug.cgi?id=1595985 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404 https://github.com/advisories/GHSA-6qvp-r6r3-9p7h https://github.com/sparklemotion/nokogiri/issues/1785 https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594 https://gitlab.gnome.org/GNOME/libxml2/issues/10 https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ https://linux.oracle.com/cve/CVE-2018-14404.html https://linux.oracle.com/errata/ELSA-2020-1827.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://nvd.nist.gov/vuln/detail/CVE-2018-14404 https://security.netapp.com/advisory/ntap-20190719-0002/ https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
| libxml2 | CVE-2019-19956 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html https://access.redhat.com/security/cve/CVE-2019-19956 https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956 https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549 https://linux.oracle.com/cve/CVE-2019-19956.html https://linux.oracle.com/errata/ELSA-2020-4479.html https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ https://security.netapp.com/advisory/ntap-20200114-0002/ https://ubuntu.com/security/notices/USN-4274-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08 https://usn.ubuntu.com/4274-1/ https://www.oracle.com/security-alerts/cpujul2020.html
|
| libxml2 | CVE-2019-20388 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html https://access.redhat.com/security/cve/CVE-2019-20388 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388 https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68 https://linux.oracle.com/cve/CVE-2019-20388.html https://linux.oracle.com/errata/ELSA-2020-4479.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ https://nvd.nist.gov/vuln/detail/CVE-2019-20388 https://security.gentoo.org/glsa/202010-04 https://security.netapp.com/advisory/ntap-20200702-0005/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 | CVE-2020-24977 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html https://access.redhat.com/security/cve/CVE-2020-24977 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977 https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 https://linux.oracle.com/cve/CVE-2020-24977.html https://linux.oracle.com/errata/ELSA-2021-1597.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/ https://nvd.nist.gov/vuln/detail/CVE-2020-24977 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20200924-0001/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 | CVE-2020-7595 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html https://access.redhat.com/security/cve/CVE-2020-7595 https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595 https://github.com/advisories/GHSA-7553-jr98-vx47 https://github.com/sparklemotion/nokogiri/issues/1992 https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076 https://linux.oracle.com/cve/CVE-2020-7595.html https://linux.oracle.com/errata/ELSA-2020-4479.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ https://nvd.nist.gov/vuln/detail/CVE-2020-7595 https://security.gentoo.org/glsa/202010-04 https://security.netapp.com/advisory/ntap-20200702-0005/ https://ubuntu.com/security/notices/USN-4274-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08 https://usn.ubuntu.com/4274-1/ https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 | CVE-2021-3516 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3516 https://bugzilla.redhat.com/show_bug.cgi?id=1954225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516 https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539 https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 https://linux.oracle.com/cve/CVE-2021-3516.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210716-0005/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
| libxml2 | CVE-2021-3517 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3517 https://bugzilla.redhat.com/show_bug.cgi?id=1954232 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517 https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2 https://gitlab.gnome.org/GNOME/libxml2/-/issues/235 https://linux.oracle.com/cve/CVE-2021-3517.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://nvd.nist.gov/vuln/detail/CVE-2021-3517 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210625-0002/ https://security.netapp.com/advisory/ntap-20211022-0004/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 | CVE-2021-3518 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://seclists.org/fulldisclosure/2021/Jul/54 http://seclists.org/fulldisclosure/2021/Jul/55 http://seclists.org/fulldisclosure/2021/Jul/58 http://seclists.org/fulldisclosure/2021/Jul/59 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3518 https://bugzilla.redhat.com/show_bug.cgi?id=1954242 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518 https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7 https://gitlab.gnome.org/GNOME/libxml2/-/issues/237 https://linux.oracle.com/cve/CVE-2021-3518.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://nvd.nist.gov/vuln/detail/CVE-2021-3518 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210625-0002/ https://support.apple.com/kb/HT212601 https://support.apple.com/kb/HT212602 https://support.apple.com/kb/HT212604 https://support.apple.com/kb/HT212605 https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 | CVE-2021-3537 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3537 https://bugzilla.redhat.com/show_bug.cgi?id=1956522 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537 https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61 https://gitlab.gnome.org/GNOME/libxml2/-/issues/243 https://gitlab.gnome.org/GNOME/libxml2/-/issues/244 https://gitlab.gnome.org/GNOME/libxml2/-/issues/245 https://linux.oracle.com/cve/CVE-2021-3537.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://nvd.nist.gov/vuln/detail/CVE-2021-3537 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210625-0002/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2 | CVE-2021-3541 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3541 https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/ https://bugzilla.redhat.com/show_bug.cgi?id=1950515 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541 https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private) https://linux.oracle.com/cve/CVE-2021-3541.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://security.netapp.com/advisory/ntap-20210805-0007/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
| libxml2 | CVE-2022-23308 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/34 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/36 http://seclists.org/fulldisclosure/2022/May/37 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/security/cve/CVE-2022-23308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308 https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS https://linux.oracle.com/cve/CVE-2022-23308.html https://linux.oracle.com/errata/ELSA-2022-0899.html https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/ https://nvd.nist.gov/vuln/detail/CVE-2022-23308 https://security.netapp.com/advisory/ntap-20220331-0008/ https://support.apple.com/kb/HT213253 https://support.apple.com/kb/HT213254 https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://support.apple.com/kb/HT213258 https://ubuntu.com/security/notices/USN-5324-1 https://ubuntu.com/security/notices/USN-5422-1
|
| libxml2 | CVE-2022-29824 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html https://access.redhat.com/security/cve/CVE-2022-29824 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824 https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14) https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master) https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14 https://gitlab.gnome.org/GNOME/libxslt/-/tags https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/ https://nvd.nist.gov/vuln/detail/CVE-2022-29824 https://ubuntu.com/security/notices/USN-5422-1 https://www.debian.org/security/2022/dsa-5142
|
| libxml2 | CVE-2017-18258 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...https://access.redhat.com/security/cve/CVE-2017-18258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258 https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb https://github.com/advisories/GHSA-882p-jqgm-f45g https://kc.mcafee.com/corporate/index?page=content&id=SB10284 https://linux.oracle.com/cve/CVE-2017-18258.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://nvd.nist.gov/vuln/detail/CVE-2017-18258 https://security.netapp.com/advisory/ntap-20190719-0001/ https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/
|
| libxml2 | CVE-2017-5969 | LOW | 2.9.1-6.el7_2.3 | | Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3 http://www.openwall.com/lists/oss-security/2017/02/13/1 http://www.securityfocus.com/bid/96188 https://access.redhat.com/security/cve/CVE-2017-5969 https://bugzilla.gnome.org/show_bug.cgi?id=778519 https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://security.gentoo.org/glsa/201711-01
|
| libxml2 | CVE-2017-8872 | LOW | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8872 https://bugzilla.gnome.org/show_bug.cgi?id=775200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872 https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://ubuntu.com/security/notices/USN-4991-1
|
| libxml2 | CVE-2017-9048 | LOW | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98556 https://access.redhat.com/security/cve/CVE-2017-9048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2 | CVE-2018-14567 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://www.securityfocus.com/bid/105198 https://access.redhat.com/security/cve/CVE-2018-14567 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567 https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 https://linux.oracle.com/cve/CVE-2018-14567.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/
|
| libxml2-python | CVE-2015-8035 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177341.html http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177381.html http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html http://rhn.redhat.com/errata/RHSA-2016-1089.html http://www.debian.org/security/2015/dsa-3430 http://www.openwall.com/lists/oss-security/2015/11/02/2 http://www.openwall.com/lists/oss-security/2015/11/02/4 http://www.openwall.com/lists/oss-security/2015/11/03/1 http://www.securityfocus.com/bid/77390 http://www.securitytracker.com/id/1034243 http://www.ubuntu.com/usn/USN-2812-1 http://xmlsoft.org/news.html https://access.redhat.com/security/cve/CVE-2015-8035 https://bugzilla.gnome.org/show_bug.cgi?id=757466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380 https://linux.oracle.com/cve/CVE-2015-8035.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT206166 https://support.apple.com/HT206167 https://support.apple.com/HT206168 https://support.apple.com/HT206169 https://ubuntu.com/security/notices/USN-2812-1
|
| libxml2-python | CVE-2016-4483 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://rhn.redhat.com/errata/RHSA-2016-2957.html http://www.debian.org/security/2016/dsa-3593 http://www.openwall.com/lists/oss-security/2016/05/03/8 http://www.openwall.com/lists/oss-security/2016/05/04/7 http://www.openwall.com/lists/oss-security/2016/06/07/4 http://www.openwall.com/lists/oss-security/2016/06/07/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/90013 http://www.securitytracker.com/id/1036348 https://access.redhat.com/security/cve/CVE-2016-4483 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483 https://git.gnome.org/browse/libxml2/commit/?id=c97750d11bb8b6f3303e7131fe526a61ac65bcfd https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201701-37 https://ubuntu.com/security/notices/USN-2994-1 https://www.tenable.com/security/tns-2016-18
|
| libxml2-python | CVE-2016-4658 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7_9.6 | Expand...http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html http://www.securityfocus.com/bid/93054 http://www.securitytracker.com/id/1036858 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2016-4658 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658 https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b https://github.com/advisories/GHSA-fr52-4hqw-p27f https://github.com/sparklemotion/nokogiri/issues/1615 https://linux.oracle.com/cve/CVE-2016-4658.html https://linux.oracle.com/errata/ELSA-2021-3810.html https://nvd.nist.gov/vuln/detail/CVE-2016-4658 https://security.gentoo.org/glsa/201701-37 https://support.apple.com/HT207141 https://support.apple.com/HT207142 https://support.apple.com/HT207143 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3235-1
|
| libxml2-python | CVE-2016-5131 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00028.html http://rhn.redhat.com/errata/RHSA-2016-1485.html http://www.debian.org/security/2016/dsa-3637 http://www.securityfocus.com/bid/92053 http://www.securitytracker.com/id/1036428 http://www.securitytracker.com/id/1038623 http://www.ubuntu.com/usn/USN-3041-1 https://access.redhat.com/security/cve/CVE-2016-5131 https://bugzilla.redhat.com/show_bug.cgi?id=1358641 https://codereview.chromium.org/2127493002 https://crbug.com/623378 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131 https://googlechromereleases.blogspot.com/2016/07/stable-channel-update.html https://linux.oracle.com/cve/CVE-2016-5131.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://security.gentoo.org/glsa/201610-09 https://security.gentoo.org/glsa/201701-37 https://source.android.com/security/bulletin/2017-05-01 https://support.apple.com/HT207141 https://support.apple.com/HT207142 https://support.apple.com/HT207143 https://support.apple.com/HT207170 https://ubuntu.com/security/notices/USN-3041-1 https://ubuntu.com/security/notices/USN-3235-1
|
| libxml2-python | CVE-2016-9318 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.securityfocus.com/bid/94347 https://access.redhat.com/security/cve/CVE-2016-9318 https://bugzilla.gnome.org/show_bug.cgi?id=772726 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9318 https://github.com/lsh123/xmlsec/issues/43 https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
| libxml2-python | CVE-2017-0663 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.securityfocus.com/bid/98877 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2017-0663 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0663 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://source.android.com/security/bulletin/2017-06-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2-python | CVE-2017-15412 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://www.securitytracker.com/id/1040348 https://access.redhat.com/errata/RHSA-2017:3401 https://access.redhat.com/errata/RHSA-2018:0287 https://access.redhat.com/security/cve/CVE-2017-15412 https://bugzilla.gnome.org/show_bug.cgi?id=783160 https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html https://crbug.com/727039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412 https://github.com/sparklemotion/nokogiri/issues/1714 https://linux.oracle.com/cve/CVE-2017-15412.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html https://security.gentoo.org/glsa/201801-03 https://ubuntu.com/security/notices/USN-3513-1 https://ubuntu.com/security/notices/USN-3513-2 https://usn.ubuntu.com/usn/usn-3513-1/ https://www.debian.org/security/2018/dsa-4086
|
| libxml2-python | CVE-2017-16931 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://xmlsoft.org/news.html https://access.redhat.com/security/cve/CVE-2017-16931 https://bugzilla.gnome.org/show_bug.cgi?id=766956 https://github.com/GNOME/libxml2/commit/e26630548e7d138d2c560844c43820b6767251e3 https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html
|
| libxml2-python | CVE-2017-16932 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://xmlsoft.org/news.html https://access.redhat.com/security/cve/CVE-2017-16932 https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html https://bugzilla.gnome.org/show_bug.cgi?id=759579 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932 https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961 https://github.com/sparklemotion/nokogiri/issues/1714 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html https://ubuntu.com/security/notices/USN-3504-1 https://ubuntu.com/security/notices/USN-3504-2 https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/usn/usn-3504-1/
|
| libxml2-python | CVE-2017-7375 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.securityfocus.com/bid/98877 http://www.securitytracker.com/id/1038623 https://access.redhat.com/security/cve/CVE-2017-7375 https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa https://bugzilla.redhat.com/show_bug.cgi?id=1462203 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7375 https://git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e https://security.gentoo.org/glsa/201711-01 https://source.android.com/security/bulletin/2017-06-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2 https://www.debian.org/security/2017/dsa-3952
|
| libxml2-python | CVE-2017-9047 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98599 https://access.redhat.com/security/cve/CVE-2017-9047 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9047 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2-python | CVE-2017-9049 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98601 https://access.redhat.com/security/cve/CVE-2017-9049 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9049 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2-python | CVE-2017-9050 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98568 https://access.redhat.com/security/cve/CVE-2017-9050 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9050 https://github.com/advisories/GHSA-8c56-cpmw-89x7 https://github.com/sparklemotion/nokogiri/issues/1673 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2017-9050 https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-0663.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7375.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-7376.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9047.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9048.html https://people.canonical.com/ubuntu-security/cve/2017/CVE-2017-9049.html https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-9050.html https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2 https://usn.ubuntu.com/usn/usn-3424-1/
|
| libxml2-python | CVE-2018-14404 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...https://access.redhat.com/errata/RHSA-2019:1543 https://access.redhat.com/security/cve/CVE-2018-14404 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817 https://bugzilla.redhat.com/show_bug.cgi?id=1595985 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404 https://github.com/advisories/GHSA-6qvp-r6r3-9p7h https://github.com/sparklemotion/nokogiri/issues/1785 https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594 https://gitlab.gnome.org/GNOME/libxml2/issues/10 https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ https://linux.oracle.com/cve/CVE-2018-14404.html https://linux.oracle.com/errata/ELSA-2020-1827.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://nvd.nist.gov/vuln/detail/CVE-2018-14404 https://security.netapp.com/advisory/ntap-20190719-0002/ https://ubuntu.com/security/notices/USN-3739-1 https://ubuntu.com/security/notices/USN-3739-2 https://usn.ubuntu.com/3739-1/ https://usn.ubuntu.com/3739-2/
|
| libxml2-python | CVE-2019-19956 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00005.html https://access.redhat.com/security/cve/CVE-2019-19956 https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956 https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549 https://linux.oracle.com/cve/CVE-2019-19956.html https://linux.oracle.com/errata/ELSA-2020-4479.html https://lists.debian.org/debian-lts-announce/2019/12/msg00032.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ https://security.netapp.com/advisory/ntap-20200114-0002/ https://ubuntu.com/security/notices/USN-4274-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08 https://usn.ubuntu.com/4274-1/ https://www.oracle.com/security-alerts/cpujul2020.html
|
| libxml2-python | CVE-2019-20388 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html https://access.redhat.com/security/cve/CVE-2019-20388 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388 https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68 https://linux.oracle.com/cve/CVE-2019-20388.html https://linux.oracle.com/errata/ELSA-2020-4479.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ https://nvd.nist.gov/vuln/detail/CVE-2019-20388 https://security.gentoo.org/glsa/202010-04 https://security.netapp.com/advisory/ntap-20200702-0005/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2-python | CVE-2020-24977 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html https://access.redhat.com/security/cve/CVE-2020-24977 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977 https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2 https://gitlab.gnome.org/GNOME/libxml2/-/issues/178 https://linux.oracle.com/cve/CVE-2020-24977.html https://linux.oracle.com/errata/ELSA-2021-1597.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/ https://nvd.nist.gov/vuln/detail/CVE-2020-24977 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20200924-0001/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2-python | CVE-2020-7595 | MEDIUM | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.5 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html https://access.redhat.com/security/cve/CVE-2020-7595 https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595 https://github.com/advisories/GHSA-7553-jr98-vx47 https://github.com/sparklemotion/nokogiri/issues/1992 https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076 https://linux.oracle.com/cve/CVE-2020-7595.html https://linux.oracle.com/errata/ELSA-2020-4479.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/ https://nvd.nist.gov/vuln/detail/CVE-2020-7595 https://security.gentoo.org/glsa/202010-04 https://security.netapp.com/advisory/ntap-20200702-0005/ https://ubuntu.com/security/notices/USN-4274-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08 https://usn.ubuntu.com/4274-1/ https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2-python | CVE-2021-3516 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3516 https://bugzilla.redhat.com/show_bug.cgi?id=1954225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3516 https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539 https://gitlab.gnome.org/GNOME/libxml2/-/issues/230 https://linux.oracle.com/cve/CVE-2021-3516.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210716-0005/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
| libxml2-python | CVE-2021-3517 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3517 https://bugzilla.redhat.com/show_bug.cgi?id=1954232 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517 https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2 https://gitlab.gnome.org/GNOME/libxml2/-/issues/235 https://linux.oracle.com/cve/CVE-2021-3517.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://nvd.nist.gov/vuln/detail/CVE-2021-3517 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210625-0002/ https://security.netapp.com/advisory/ntap-20211022-0004/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2-python | CVE-2021-3518 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://seclists.org/fulldisclosure/2021/Jul/54 http://seclists.org/fulldisclosure/2021/Jul/55 http://seclists.org/fulldisclosure/2021/Jul/58 http://seclists.org/fulldisclosure/2021/Jul/59 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3518 https://bugzilla.redhat.com/show_bug.cgi?id=1954242 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518 https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7 https://gitlab.gnome.org/GNOME/libxml2/-/issues/237 https://linux.oracle.com/cve/CVE-2021-3518.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://nvd.nist.gov/vuln/detail/CVE-2021-3518 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210625-0002/ https://support.apple.com/kb/HT212601 https://support.apple.com/kb/HT212602 https://support.apple.com/kb/HT212604 https://support.apple.com/kb/HT212605 https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2-python | CVE-2021-3537 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3537 https://bugzilla.redhat.com/show_bug.cgi?id=1956522 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537 https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61 https://gitlab.gnome.org/GNOME/libxml2/-/issues/243 https://gitlab.gnome.org/GNOME/libxml2/-/issues/244 https://gitlab.gnome.org/GNOME/libxml2/-/issues/245 https://linux.oracle.com/cve/CVE-2021-3537.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/ https://nvd.nist.gov/vuln/detail/CVE-2021-3537 https://security.gentoo.org/glsa/202107-05 https://security.netapp.com/advisory/ntap-20210625-0002/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| libxml2-python | CVE-2021-3541 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3516.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json https://access.redhat.com/security/cve/CVE-2021-3541 https://blog.hartwork.org/posts/cve-2021-3541-parameter-laughs-fixed-in-libxml2-2-9-11/ https://bugzilla.redhat.com/show_bug.cgi?id=1950515 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541 https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private) https://linux.oracle.com/cve/CVE-2021-3541.html https://linux.oracle.com/errata/ELSA-2021-2569.html https://security.netapp.com/advisory/ntap-20210805-0007/ https://ubuntu.com/security/notices/USN-4991-1 https://www.oracle.com/security-alerts/cpujan2022.html
|
| libxml2-python | CVE-2022-23308 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/34 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/36 http://seclists.org/fulldisclosure/2022/May/37 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/security/cve/CVE-2022-23308 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308 https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS https://linux.oracle.com/cve/CVE-2022-23308.html https://linux.oracle.com/errata/ELSA-2022-0899.html https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LA3MWWAYZADWJ5F6JOUBX65UZAMQB7RF/ https://nvd.nist.gov/vuln/detail/CVE-2022-23308 https://security.netapp.com/advisory/ntap-20220331-0008/ https://support.apple.com/kb/HT213253 https://support.apple.com/kb/HT213254 https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://support.apple.com/kb/HT213258 https://ubuntu.com/security/notices/USN-5324-1 https://ubuntu.com/security/notices/USN-5422-1
|
| libxml2-python | CVE-2022-29824 | MEDIUM | 2.9.1-6.el7_2.3 | | Expand...http://packetstormsecurity.com/files/167345/libxml2-xmlBufAdd-Heap-Buffer-Overflow.html https://access.redhat.com/security/cve/CVE-2022-29824 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824 https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a2408e09f13652049e5ffb0d26196b02ebab (v2.9.14) https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd https://gitlab.gnome.org/GNOME/libxml2/-/commit/6c283d83eccd940bcde15634ac8c7f100e3caefd (master) https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.9.14 https://gitlab.gnome.org/GNOME/libxslt/-/tags https://lists.debian.org/debian-lts-announce/2022/05/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FZOBT5Y6Y2QLDDX2HZGMV7MJMWGXORKK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3NVZVWFRBXBI3AKZZWUWY6INQQPQVSF/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5363EDV5VHZ5C77ODA43RYDCPMA7ARM/ https://nvd.nist.gov/vuln/detail/CVE-2022-29824 https://ubuntu.com/security/notices/USN-5422-1 https://www.debian.org/security/2022/dsa-5142
|
| libxml2-python | CVE-2017-18258 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...https://access.redhat.com/security/cve/CVE-2017-18258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258 https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb https://github.com/advisories/GHSA-882p-jqgm-f45g https://kc.mcafee.com/corporate/index?page=content&id=SB10284 https://linux.oracle.com/cve/CVE-2017-18258.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://nvd.nist.gov/vuln/detail/CVE-2017-18258 https://security.netapp.com/advisory/ntap-20190719-0001/ https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/
|
| libxml2-python | CVE-2017-5969 | LOW | 2.9.1-6.el7_2.3 | | Expand...http://www.openwall.com/lists/oss-security/2016/11/05/3 http://www.openwall.com/lists/oss-security/2017/02/13/1 http://www.securityfocus.com/bid/96188 https://access.redhat.com/security/cve/CVE-2017-5969 https://bugzilla.gnome.org/show_bug.cgi?id=778519 https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html https://security.gentoo.org/glsa/201711-01
|
| libxml2-python | CVE-2017-8872 | LOW | 2.9.1-6.el7_2.3 | | Expand...https://access.redhat.com/security/cve/CVE-2017-8872 https://bugzilla.gnome.org/show_bug.cgi?id=775200 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8872 https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://ubuntu.com/security/notices/USN-4991-1
|
| libxml2-python | CVE-2017-9048 | LOW | 2.9.1-6.el7_2.3 | | Expand...http://www.debian.org/security/2017/dsa-3952 http://www.openwall.com/lists/oss-security/2017/05/15/1 http://www.securityfocus.com/bid/98556 https://access.redhat.com/security/cve/CVE-2017-9048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9048 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201711-01 https://ubuntu.com/security/notices/USN-3424-1 https://ubuntu.com/security/notices/USN-3424-2
|
| libxml2-python | CVE-2018-14567 | LOW | 2.9.1-6.el7_2.3 | 2.9.1-6.el7.4 | Expand...http://www.securityfocus.com/bid/105198 https://access.redhat.com/security/cve/CVE-2018-14567 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567 https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74 https://linux.oracle.com/cve/CVE-2018-14567.html https://linux.oracle.com/errata/ELSA-2020-1190.html https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html https://ubuntu.com/security/notices/USN-3739-1 https://usn.ubuntu.com/3739-1/
|
| lua | CVE-2014-5461 | MEDIUM | 5.1.4-15.el7 | | Expand...http://advisories.mageia.org/MGASA-2014-0414.html http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html http://secunia.com/advisories/59890 http://secunia.com/advisories/60869 http://secunia.com/advisories/61411 http://www.debian.org/security/2014/dsa-3015 http://www.debian.org/security/2014/dsa-3016 http://www.lua.org/bugs.html#5.2.2-1 http://www.mandriva.com/security/advisories?name=MDVSA-2015:144 http://www.openwall.com/lists/oss-security/2014/08/21/1 http://www.openwall.com/lists/oss-security/2014/08/21/4 http://www.openwall.com/lists/oss-security/2014/08/27/2 http://www.securityfocus.com/bid/69342 http://www.ubuntu.com/usn/USN-2338-1 https://access.redhat.com/security/cve/CVE-2014-5461 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461 https://security.gentoo.org/glsa/201701-53 https://ubuntu.com/security/notices/USN-2338-1
|
| lua | CVE-2021-43519 | MEDIUM | 5.1.4-15.el7 | | Expand...http://lua-users.org/lists/lua-l/2021-10/msg00123.html http://lua-users.org/lists/lua-l/2021-11/msg00015.html https://access.redhat.com/security/cve/CVE-2021-43519 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XHFYHGSZKL53VCLSJSAJ6VMFGAIXKO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3EMGAQ5Y6GXJLY4K5DUOOEQT4MZ4J4F/ https://nvd.nist.gov/vuln/detail/CVE-2021-43519
|
| lz4 | CVE-2019-17543 | MEDIUM | 1.7.5-3.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html https://access.redhat.com/security/cve/CVE-2019-17543 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941 https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2 https://github.com/lz4/lz4/issues/801 https://github.com/lz4/lz4/pull/756 https://github.com/lz4/lz4/pull/760 https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316@%3Cissues.arrow.apache.org%3E https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3@%3Cdev.arrow.apache.org%3E https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26@%3Cissues.kudu.apache.org%3E https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720@%3Cissues.kudu.apache.org%3E https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960@%3Cissues.kudu.apache.org%3E https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
| lz4 | CVE-2021-3520 | MEDIUM | 1.7.5-3.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json https://access.redhat.com/security/cve/CVE-2021-3520 https://bugzilla.redhat.com/show_bug.cgi?id=1954559 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520 https://errata.almalinux.org/8/ALSA-2021-2575.html https://github.com/lz4/lz4/pull/972 https://linux.oracle.com/cve/CVE-2021-3520.html https://linux.oracle.com/errata/ELSA-2021-2575.html https://security.netapp.com/advisory/ntap-20211104-0005/ https://ubuntu.com/security/notices/USN-4968-1 https://ubuntu.com/security/notices/USN-4968-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| mesa-dri-drivers | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-filesystem | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-libEGL | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-libGL | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-libGL-devel | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-libOSMesa | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-libOSMesa-devel | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-libgbm | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mesa-libglapi | CVE-2019-5068 | MEDIUM | 18.3.4-12.el7_9 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html https://access.redhat.com/security/cve/CVE-2019-5068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5068 https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857 https://ubuntu.com/security/notices/USN-4271-1 https://usn.ubuntu.com/4271-1/ https://www.mesa3d.org/relnotes/19.1.8.html
|
| mpfr | CVE-2014-9474 | LOW | 3.1.1-4.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147737.html http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147745.html http://www.mpfr.org/mpfr-3.1.2/patch11 http://www.openwall.com/lists/oss-security/2015/01/03/12 http://www.securityfocus.com/bid/71542 https://access.redhat.com/security/cve/CVE-2014-9474 https://bugzilla.redhat.com/show_bug.cgi?id=1171701 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474 https://gforge.inria.fr/scm/viewvc.php/mpfr?revision=9243&view=revision https://gforge.inria.fr/scm/viewvc.php?view=rev&root=mpfr&revision=9243 https://gmplib.org/list-archives/gmp-bugs/2013-December/003267.html https://security.gentoo.org/glsa/201512-06
|
| nasm | CVE-2017-10686 | MEDIUM | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10686 https://bugzilla.nasm.us/show_bug.cgi?id=3392414 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10686 https://security.gentoo.org/glsa/201903-19 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-11111 | MEDIUM | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11111 https://bugzilla.nasm.us/show_bug.cgi?id=3392415 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11111 https://security.gentoo.org/glsa/201903-19 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-14228 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-14228 https://bugzilla.nasm.us/show_bug.cgi?id=3392423 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14228 https://security.gentoo.org/glsa/201903-19 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17810 | LOW | 2.10.07-7.el7 | | Expand...http://repo.or.cz/nasm.git/commit/59ce1c67b16967c652765e62aa130b7e43f21dd4 https://access.redhat.com/security/cve/CVE-2017-17810 https://bugzilla.nasm.us/show_bug.cgi?id=3392431 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17810 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17811 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17811 https://bugzilla.nasm.us/show_bug.cgi?id=3392432 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17811 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17812 | LOW | 2.10.07-7.el7 | | Expand...http://repo.or.cz/nasm.git/commit/9b7ee09abfd426b99aa1ea81d19a3b2818eeabf9 https://access.redhat.com/security/cve/CVE-2017-17812 https://bugzilla.nasm.us/show_bug.cgi?id=3392424 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17812 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17813 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17813 https://bugzilla.nasm.us/show_bug.cgi?id=3392429 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17813 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17814 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17814 https://bugzilla.nasm.us/show_bug.cgi?id=3392430 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17814 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17815 | LOW | 2.10.07-7.el7 | | Expand...http://repo.or.cz/nasm.git/commit/c9244eaadd05b27637cde06021bac3fa1d920aa3 https://access.redhat.com/security/cve/CVE-2017-17815 https://bugzilla.nasm.us/show_bug.cgi?id=3392436 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17815 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17816 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17816 https://bugzilla.nasm.us/show_bug.cgi?id=3392426 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17816 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17817 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17817 https://bugzilla.nasm.us/show_bug.cgi?id=3392427 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17817 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17818 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17818 https://bugzilla.nasm.us/show_bug.cgi?id=3392428 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17818 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17819 | LOW | 2.10.07-7.el7 | | Expand...http://repo.or.cz/nasm.git/commit/7524cfd91492e6e3719b959498be584a9ced13af https://access.redhat.com/security/cve/CVE-2017-17819 https://bugzilla.nasm.us/show_bug.cgi?id=3392435 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17819 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2017-17820 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-17820 https://bugzilla.nasm.us/show_bug.cgi?id=3392433 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17820 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2018-1000667 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-1000667 https://bugzilla.nasm.us/show_bug.cgi?id=3392507 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000667 https://github.com/cyrillos/nasm/issues/3
|
| nasm | CVE-2018-1000886 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-1000886 https://bugzilla.nasm.us/show_bug.cgi?id=3392514 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000886
|
| nasm | CVE-2018-10016 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-10016 https://bugzilla.nasm.us/show_bug.cgi?id=3392473 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10016
|
| nasm | CVE-2018-10254 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-10254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10254 https://sourceforge.net/p/nasm/bugs/561/
|
| nasm | CVE-2018-10316 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-10316 https://bugzilla.nasm.us/show_bug.cgi?id=3392474 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10316
|
| nasm | CVE-2018-16382 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-16382 https://bugzilla.nasm.us/show_bug.cgi?id=3392503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16382
|
| nasm | CVE-2018-19213 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19213 https://bugzilla.nasm.us/show_bug.cgi?id=3392524 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19213
|
| nasm | CVE-2018-19214 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-19214 https://bugzilla.nasm.us/show_bug.cgi?id=3392521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19214 https://repo.or.cz/nasm.git/commit/661f723d39e03ca6eb05d7376a43ca33db478354
|
| nasm | CVE-2018-19215 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-19215 https://bugzilla.nasm.us/show_bug.cgi?id=3392525 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19215 https://repo.or.cz/nasm.git/commit/4b5b737d4991578b1918303dc0fd9c9ab5c7ce4f
|
| nasm | CVE-2018-19755 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19755 https://bugzilla.nasm.us/show_bug.cgi?id=3392528 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19755 https://repo.or.cz/nasm.git/commit/3079f7966dbed4497e36d5067cbfd896a90358cb
|
| nasm | CVE-2018-20535 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-20535 https://bugzilla.nasm.us/show_bug.cgi?id=3392530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20535
|
| nasm | CVE-2018-20538 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-20538 https://bugzilla.nasm.us/show_bug.cgi?id=3392531 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20538
|
| nasm | CVE-2018-8881 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-8881 https://bugzilla.nasm.us/show_bug.cgi?id=3392446 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8881 https://ubuntu.com/security/notices/USN-3694-1 https://usn.ubuntu.com/3694-1/
|
| nasm | CVE-2018-8882 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-8882 https://bugzilla.nasm.us/show_bug.cgi?id=3392445 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8882
|
| nasm | CVE-2018-8883 | LOW | 2.10.07-7.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00017.html https://access.redhat.com/security/cve/CVE-2018-8883 https://bugzilla.nasm.us/show_bug.cgi?id=3392447 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8883
|
| nasm | CVE-2019-20334 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-20334 https://bugzilla.nasm.us/show_bug.cgi?id=3392548#c4 https://bugzilla.nasm.us/show_bug.cgi?id=3392638
|
| nasm | CVE-2019-20352 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-20352 https://bugzilla.nasm.us/show_bug.cgi?id=3392636
|
| nasm | CVE-2019-6290 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-6290 https://bugzilla.nasm.us/show_bug.cgi?id=3392548 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6290
|
| nasm | CVE-2019-6291 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-6291 https://bugzilla.nasm.us/show_bug.cgi?id=3392549 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6291
|
| nasm | CVE-2019-8343 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-8343 https://bugzilla.nasm.us/show_bug.cgi?id=3392556 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8343
|
| nasm | CVE-2020-18974 | LOW | 2.10.07-7.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-18974 https://bugzilla.nasm.us/show_bug.cgi?id=3392568
|
| ncurses | CVE-2017-10684 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10684 https://bugzilla.redhat.com/show_bug.cgi?id=1464687 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-10685 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10685 https://bugzilla.redhat.com/show_bug.cgi?id=1464692 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2019-17594 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses | CVE-2019-17595 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses | CVE-2021-39537 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses | CVE-2017-11112 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11112 https://bugzilla.redhat.com/show_bug.cgi?id=1464686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-11113 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11113 https://bugzilla.redhat.com/show_bug.cgi?id=1464691 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-13728 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13728 https://bugzilla.redhat.com/show_bug.cgi?id=1484274 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-13729 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13729 https://bugzilla.redhat.com/show_bug.cgi?id=1484276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-13730 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13730 https://bugzilla.redhat.com/show_bug.cgi?id=1484284 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-13731 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13731 https://bugzilla.redhat.com/show_bug.cgi?id=1484285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-13732 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13732 https://bugzilla.redhat.com/show_bug.cgi?id=1484287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-13733 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13733 https://bugzilla.redhat.com/show_bug.cgi?id=1484290 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-13734 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13734 https://bugzilla.redhat.com/show_bug.cgi?id=1484291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses | CVE-2017-16879 | LOW | 5.9-14.20130511.el7_4 | | Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125 http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html https://access.redhat.com/security/cve/CVE-2017-16879 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://tools.cisco.com/security/center/viewAlert.x?alertId=57695 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses | CVE-2018-19211 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19211 https://bugzilla.redhat.com/show_bug.cgi?id=1643754 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses | CVE-2018-19217 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19217 https://bugzilla.redhat.com/show_bug.cgi?id=1643753 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217 https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
|
| ncurses-base | CVE-2017-10684 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10684 https://bugzilla.redhat.com/show_bug.cgi?id=1464687 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-10685 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10685 https://bugzilla.redhat.com/show_bug.cgi?id=1464692 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2019-17594 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-base | CVE-2019-17595 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-base | CVE-2021-39537 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-base | CVE-2017-11112 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11112 https://bugzilla.redhat.com/show_bug.cgi?id=1464686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-11113 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11113 https://bugzilla.redhat.com/show_bug.cgi?id=1464691 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-13728 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13728 https://bugzilla.redhat.com/show_bug.cgi?id=1484274 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-13729 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13729 https://bugzilla.redhat.com/show_bug.cgi?id=1484276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-13730 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13730 https://bugzilla.redhat.com/show_bug.cgi?id=1484284 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-13731 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13731 https://bugzilla.redhat.com/show_bug.cgi?id=1484285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-13732 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13732 https://bugzilla.redhat.com/show_bug.cgi?id=1484287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-13733 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13733 https://bugzilla.redhat.com/show_bug.cgi?id=1484290 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-13734 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13734 https://bugzilla.redhat.com/show_bug.cgi?id=1484291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-base | CVE-2017-16879 | LOW | 5.9-14.20130511.el7_4 | | Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125 http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html https://access.redhat.com/security/cve/CVE-2017-16879 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://tools.cisco.com/security/center/viewAlert.x?alertId=57695 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-base | CVE-2018-19211 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19211 https://bugzilla.redhat.com/show_bug.cgi?id=1643754 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-base | CVE-2018-19217 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19217 https://bugzilla.redhat.com/show_bug.cgi?id=1643753 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217 https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
|
| ncurses-libs | CVE-2017-10684 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10684 https://bugzilla.redhat.com/show_bug.cgi?id=1464687 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10684 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-10685 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-10685 https://bugzilla.redhat.com/show_bug.cgi?id=1464692 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10685 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2019-17594 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17594 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17594 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17594.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00017.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-libs | CVE-2019-17595 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00059.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00061.html https://access.redhat.com/security/cve/CVE-2019-17595 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17595 https://errata.almalinux.org/8/ALSA-2021-4426.html https://linux.oracle.com/cve/CVE-2019-17595.html https://linux.oracle.com/errata/ELSA-2021-4426.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00013.html https://lists.gnu.org/archive/html/bug-ncurses/2019-10/msg00045.html https://security.gentoo.org/glsa/202101-28 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-libs | CVE-2021-39537 | MEDIUM | 5.9-14.20130511.el7_4 | | Expand...http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup https://access.redhat.com/security/cve/CVE-2021-39537 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39537 https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html https://nvd.nist.gov/vuln/detail/CVE-2021-39537 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-libs | CVE-2017-11112 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11112 https://bugzilla.redhat.com/show_bug.cgi?id=1464686 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11112 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-11113 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11113 https://bugzilla.redhat.com/show_bug.cgi?id=1464691 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11113 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-13728 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13728 https://bugzilla.redhat.com/show_bug.cgi?id=1484274 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13728 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-13729 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13729 https://bugzilla.redhat.com/show_bug.cgi?id=1484276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13729 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-13730 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13730 https://bugzilla.redhat.com/show_bug.cgi?id=1484284 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13730 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-13731 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13731 https://bugzilla.redhat.com/show_bug.cgi?id=1484285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13731 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-13732 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13732 https://bugzilla.redhat.com/show_bug.cgi?id=1484287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13732 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-13733 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13733 https://bugzilla.redhat.com/show_bug.cgi?id=1484290 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13733 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-13734 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2017-13734 https://bugzilla.redhat.com/show_bug.cgi?id=1484291 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13734 https://security.gentoo.org/glsa/201804-13 https://ubuntu.com/security/notices/USN-5448-1
|
| ncurses-libs | CVE-2017-16879 | LOW | 5.9-14.20130511.el7_4 | | Expand...http://invisible-island.net/ncurses/NEWS.html#t20171125 http://packetstormsecurity.com/files/145045/GNU-ncurses-6.0-tic-Denial-Of-Service.html https://access.redhat.com/security/cve/CVE-2017-16879 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16879 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201804-13 https://tools.cisco.com/security/center/viewAlert.x?alertId=57695 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-libs | CVE-2018-19211 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19211 https://bugzilla.redhat.com/show_bug.cgi?id=1643754 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19211 https://ubuntu.com/security/notices/USN-5477-1
|
| ncurses-libs | CVE-2018-19217 | LOW | 5.9-14.20130511.el7_4 | | Expand...https://access.redhat.com/security/cve/CVE-2018-19217 https://bugzilla.redhat.com/show_bug.cgi?id=1643753 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19217 https://lists.gnu.org/archive/html/bug-ncurses/2019-04/msg00020.html
|
| nspr | CVE-2016-1951 | MEDIUM | 4.21.0-1.el7 | | Expand...http://www.securityfocus.com/bid/92385 http://www.securitytracker.com/id/1036590 http://www.ubuntu.com/usn/USN-3023-1 https://access.redhat.com/security/cve/CVE-2016-1951 https://bugzilla.mozilla.org/show_bug.cgi?id=1174015 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1951 https://groups.google.com/forum/#!topic/mozilla.dev.tech.nspr/dV4MyMsg6jw https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/dV4MyMsg6jw/hhWcXOgJDQAJ https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2 https://ubuntu.com/security/notices/USN-3023-1 https://ubuntu.com/security/notices/USN-3028-1
|
| nspr | CVE-2019-11719 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11719 https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719 https://linux.oracle.com/cve/CVE-2019-11719.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nspr | CVE-2019-11756 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-11756 https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes https://linux.oracle.com/cve/CVE-2019-11756.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756 https://www.mozilla.org/security/advisories/mfsa2019-36/
|
| nspr | CVE-2019-17006 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17006 https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34 https://linux.oracle.com/cve/CVE-2019-17006.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.netapp.com/advisory/ntap-20210129-0001/ https://ubuntu.com/security/notices/USN-4231-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nspr | CVE-2020-12400 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12400 https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12400.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nspr | CVE-2020-12401 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12401 https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12401.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nspr | CVE-2020-12402 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html https://access.redhat.com/security/cve/CVE-2020-12402 https://bugzilla.mozilla.org/show_bug.cgi?id=1631597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes https://linux.oracle.com/cve/CVE-2020-12402.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/ https://security.gentoo.org/glsa/202007-10 https://ubuntu.com/security/notices/USN-4417-1 https://ubuntu.com/security/notices/USN-4417-2 https://usn.ubuntu.com/4417-1/ https://usn.ubuntu.com/4417-2/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/security/advisories/mfsa2020-24/
|
| nspr | CVE-2020-12403 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12403 https://bugzilla.redhat.com/show_bug.cgi?id=1868931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12403.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://nvd.nist.gov/vuln/detail/CVE-2020-12403 https://ubuntu.com/security/notices/USN-4476-1
|
| nspr | CVE-2020-6829 | MEDIUM | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-6829 https://bugzilla.mozilla.org/show_bug.cgi?id=1631583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-6829.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nspr | CVE-2019-11727 | LOW | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11727 https://bugzilla.mozilla.org/show_bug.cgi?id=1552208 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727 https://linux.oracle.com/cve/CVE-2019-11727.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.gentoo.org/glsa/201908-12 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727 https://www.mozilla.org/security/advisories/mfsa2019-21/
|
| nspr | CVE-2019-17023 | LOW | 4.21.0-1.el7 | 4.25.0-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17023 https://bugzilla.mozilla.org/show_bug.cgi?id=1590001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://linux.oracle.com/cve/CVE-2019-17023.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4234-1 https://ubuntu.com/security/notices/USN-4397-1 https://usn.ubuntu.com/4234-1/ https://usn.ubuntu.com/4397-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023 https://www.mozilla.org/security/advisories/mfsa2020-01/
|
| nss | CVE-2021-43527 | CRITICAL | 3.44.0-4.el7 | 3.67.0-4.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json https://access.redhat.com/security/cve/CVE-2021-43527 https://bugzilla.mozilla.org/show_bug.cgi?id=1737470 https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527 https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/ https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/ https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html https://linux.oracle.com/cve/CVE-2021-43527.html https://linux.oracle.com/errata/ELSA-2021-9591.html https://nvd.nist.gov/vuln/detail/CVE-2021-43527 https://security.netapp.com/advisory/ntap-20211229-0002/ https://ubuntu.com/security/notices/USN-5168-1 https://ubuntu.com/security/notices/USN-5168-2 https://ubuntu.com/security/notices/USN-5168-3 https://ubuntu.com/security/notices/USN-5168-4 https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/ https://www.mozilla.org/security/advisories/mfsa2021-51/ https://www.oracle.com/security-alerts/cpuapr2022.html
|
| nss | CVE-2019-11745 | HIGH | 3.44.0-4.el7 | 3.44.0-7.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2020:0243 https://access.redhat.com/errata/RHSA-2020:0466 https://access.redhat.com/security/cve/CVE-2019-11745 https://bugzilla.mozilla.org/show_bug.cgi?id=1586176 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes https://linux.oracle.com/cve/CVE-2019-11745.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202003-02 https://security.gentoo.org/glsa/202003-10 https://security.gentoo.org/glsa/202003-37 https://ubuntu.com/security/notices/USN-4203-1 https://ubuntu.com/security/notices/USN-4203-2 https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://ubuntu.com/security/notices/USN-4241-1 https://ubuntu.com/security/notices/USN-4335-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 https://usn.ubuntu.com/4241-1/ https://usn.ubuntu.com/4335-1/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745 https://www.mozilla.org/security/advisories/mfsa2019-36/ https://www.mozilla.org/security/advisories/mfsa2019-37/ https://www.mozilla.org/security/advisories/mfsa2019-38/
|
| nss | CVE-2015-2808 | MEDIUM | 3.44.0-4.el7 | | Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html http://marc.info/?l=bugtraq&m=143456209711959&w=2 http://marc.info/?l=bugtraq&m=143629696317098&w=2 http://marc.info/?l=bugtraq&m=143741441012338&w=2 http://marc.info/?l=bugtraq&m=143817021313142&w=2 http://marc.info/?l=bugtraq&m=143817899717054&w=2 http://marc.info/?l=bugtraq&m=143818140118771&w=2 http://marc.info/?l=bugtraq&m=144043644216842&w=2 http://marc.info/?l=bugtraq&m=144059660127919&w=2 http://marc.info/?l=bugtraq&m=144059703728085&w=2 http://marc.info/?l=bugtraq&m=144060576831314&w=2 http://marc.info/?l=bugtraq&m=144060606031437&w=2 http://marc.info/?l=bugtraq&m=144069189622016&w=2 http://marc.info/?l=bugtraq&m=144102017024820&w=2 http://marc.info/?l=bugtraq&m=144104533800819&w=2 http://marc.info/?l=bugtraq&m=144104565600964&w=2 http://marc.info/?l=bugtraq&m=144493176821532&w=2 http://rhn.redhat.com/errata/RHSA-2015-1006.html http://rhn.redhat.com/errata/RHSA-2015-1007.html http://rhn.redhat.com/errata/RHSA-2015-1020.html http://rhn.redhat.com/errata/RHSA-2015-1021.html http://rhn.redhat.com/errata/RHSA-2015-1091.html http://rhn.redhat.com/errata/RHSA-2015-1228.html http://rhn.redhat.com/errata/RHSA-2015-1229.html http://rhn.redhat.com/errata/RHSA-2015-1230.html http://rhn.redhat.com/errata/RHSA-2015-1241.html http://rhn.redhat.com/errata/RHSA-2015-1242.html http://rhn.redhat.com/errata/RHSA-2015-1243.html http://rhn.redhat.com/errata/RHSA-2015-1526.html http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888 http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892 http://www-01.ibm.com/support/docview.wss?uid=swg21883640 http://www-304.ibm.com/support/docview.wss?uid=swg21903565 http://www-304.ibm.com/support/docview.wss?uid=swg21960015 http://www-304.ibm.com/support/docview.wss?uid=swg21960769 http://www.debian.org/security/2015/dsa-3316 http://www.debian.org/security/2015/dsa-3339 http://www.huawei.com/en/psirt/security-advisories/hw-454055 http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.securityfocus.com/bid/73684 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1032599 http://www.securitytracker.com/id/1032600 http://www.securitytracker.com/id/1032707 http://www.securitytracker.com/id/1032708 http://www.securitytracker.com/id/1032734 http://www.securitytracker.com/id/1032788 http://www.securitytracker.com/id/1032858 http://www.securitytracker.com/id/1032868 http://www.securitytracker.com/id/1032910 http://www.securitytracker.com/id/1032990 http://www.securitytracker.com/id/1033071 http://www.securitytracker.com/id/1033072 http://www.securitytracker.com/id/1033386 http://www.securitytracker.com/id/1033415 http://www.securitytracker.com/id/1033431 http://www.securitytracker.com/id/1033432 http://www.securitytracker.com/id/1033737 http://www.securitytracker.com/id/1033769 http://www.securitytracker.com/id/1036222 http://www.ubuntu.com/usn/USN-2696-1 http://www.ubuntu.com/usn/USN-2706-1 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm https://access.redhat.com/security/cve/CVE-2015-2808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888 https://kb.juniper.net/JSA10783 https://kc.mcafee.com/corporate/index?page=content&id=SB10163 https://linux.oracle.com/cve/CVE-2015-2808.html https://linux.oracle.com/errata/ELSA-2015-1526.html https://security.gentoo.org/glsa/201512-10 https://ubuntu.com/security/notices/USN-2696-1 https://ubuntu.com/security/notices/USN-2706-1 https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709 https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
|
| nss | CVE-2016-2183 | MEDIUM | 3.44.0-4.el7 | | Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html http://rhn.redhat.com/errata/RHSA-2017-0336.html http://rhn.redhat.com/errata/RHSA-2017-0337.html http://rhn.redhat.com/errata/RHSA-2017-0338.html http://rhn.redhat.com/errata/RHSA-2017-0462.html http://seclists.org/fulldisclosure/2017/Jul/31 http://seclists.org/fulldisclosure/2017/May/105 http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 http://www-01.ibm.com/support/docview.wss?uid=swg21991482 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/542005/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded http://www.securityfocus.com/bid/92630 http://www.securityfocus.com/bid/95568 http://www.securitytracker.com/id/1036696 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 http://www.ubuntu.com/usn/USN-3179-1 http://www.ubuntu.com/usn/USN-3194-1 http://www.ubuntu.com/usn/USN-3198-1 http://www.ubuntu.com/usn/USN-3270-1 http://www.ubuntu.com/usn/USN-3372-1 https://access.redhat.com/articles/2548661 https://access.redhat.com/errata/RHSA-2016:1940 https://access.redhat.com/errata/RHSA-2017:1216 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2018:2123 https://access.redhat.com/errata/RHSA-2019:1245 https://access.redhat.com/errata/RHSA-2019:2859 https://access.redhat.com/errata/RHSA-2020:0451 https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/cve/cve-2016-2183 https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ https://bto.bluecoat.com/security-advisory/sa133 https://bugzilla.redhat.com/show_bug.cgi?id=1369383 https://community.qualys.com/thread/16555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10186 https://kc.mcafee.com/corporate/index?page=content&id=SB10197 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://kc.mcafee.com/corporate/index?page=content&id=SB10310 https://linux.oracle.com/cve/CVE-2016-2183.html https://linux.oracle.com/errata/ELSA-2018-2123.html https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575 https://seclists.org/bugtraq/2018/Nov/21 https://security-tracker.debian.org/tracker/CVE-2016-2183 https://security.gentoo.org/glsa/201612-16 https://security.gentoo.org/glsa/201701-65 https://security.gentoo.org/glsa/201707-01 https://security.netapp.com/advisory/ntap-20160915-0001/ https://security.netapp.com/advisory/ntap-20170119-0001/ https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 https://support.f5.com/csp/article/K13167034 https://sweet32.info/ https://twitter.com/symantec/status/768786631159603200 https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3179-1 https://ubuntu.com/security/notices/USN-3194-1 https://ubuntu.com/security/notices/USN-3198-1 https://ubuntu.com/security/notices/USN-3270-1 https://ubuntu.com/security/notices/USN-3372-1 https://wiki.opendaylight.org/view/Security_Advisories https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.exploit-db.com/exploits/42091/ https://www.ietf.org/mail-archive/web/tls/current/msg04560.html https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.sigsac.org/ccs/CCS2016/accepted-papers/ https://www.suse.com/security/cve/CVE-2016-2183.html https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21 https://www.tenable.com/security/tns-2017-09 https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
| nss | CVE-2016-9074 | MEDIUM | 3.44.0-4.el7 | | Expand...http://www.securityfocus.com/bid/94341 http://www.securitytracker.com/id/1037298 https://access.redhat.com/security/cve/CVE-2016-9074 https://bugzilla.mozilla.org/show_bug.cgi?id=1293334 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074 https://security.gentoo.org/glsa/201701-15 https://security.gentoo.org/glsa/201701-46 https://ubuntu.com/security/notices/USN-3163-1 https://www.debian.org/security/2016/dsa-3730 https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074 https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/ https://www.mozilla.org/security/advisories/mfsa2016-89/ https://www.mozilla.org/security/advisories/mfsa2016-90/ https://www.mozilla.org/security/advisories/mfsa2016-93/
|
| nss | CVE-2016-9574 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2016-9574 https://bugzilla.mozilla.org/show_bug.cgi?id=1320695 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
|
| nss | CVE-2018-18508 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-18508 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes https://linux.oracle.com/cve/CVE-2018-18508.html https://linux.oracle.com/errata/ELSA-2019-1951.html https://ubuntu.com/security/notices/USN-3898-1 https://ubuntu.com/security/notices/USN-3898-2 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss | CVE-2019-11719 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11719 https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719 https://linux.oracle.com/cve/CVE-2019-11719.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss | CVE-2019-11729 | MEDIUM | 3.44.0-4.el7 | 3.44.0-7.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/errata/RHSA-2019:4190 https://access.redhat.com/security/cve/CVE-2019-11729 https://bugzilla.mozilla.org/show_bug.cgi?id=1515342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729 https://linux.oracle.com/cve/CVE-2019-11729.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss | CVE-2019-11756 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-11756 https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes https://linux.oracle.com/cve/CVE-2019-11756.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756 https://www.mozilla.org/security/advisories/mfsa2019-36/
|
| nss | CVE-2019-17006 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17006 https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34 https://linux.oracle.com/cve/CVE-2019-17006.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.netapp.com/advisory/ntap-20210129-0001/ https://ubuntu.com/security/notices/USN-4231-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss | CVE-2020-12399 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-12399 https://bugzilla.mozilla.org/show_bug.cgi?id=1631576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202007-49 https://ubuntu.com/security/notices/USN-4383-1 https://ubuntu.com/security/notices/USN-4397-1 https://ubuntu.com/security/notices/USN-4397-2 https://ubuntu.com/security/notices/USN-4421-1 https://usn.ubuntu.com/4421-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399 https://www.mozilla.org/security/advisories/mfsa2020-20/ https://www.mozilla.org/security/advisories/mfsa2020-21/ https://www.mozilla.org/security/advisories/mfsa2020-22/
|
| nss | CVE-2020-12400 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12400 https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12400.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss | CVE-2020-12401 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12401 https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12401.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss | CVE-2020-12402 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html https://access.redhat.com/security/cve/CVE-2020-12402 https://bugzilla.mozilla.org/show_bug.cgi?id=1631597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes https://linux.oracle.com/cve/CVE-2020-12402.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/ https://security.gentoo.org/glsa/202007-10 https://ubuntu.com/security/notices/USN-4417-1 https://ubuntu.com/security/notices/USN-4417-2 https://usn.ubuntu.com/4417-1/ https://usn.ubuntu.com/4417-2/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/security/advisories/mfsa2020-24/
|
| nss | CVE-2020-12403 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12403 https://bugzilla.redhat.com/show_bug.cgi?id=1868931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12403.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://nvd.nist.gov/vuln/detail/CVE-2020-12403 https://ubuntu.com/security/notices/USN-4476-1
|
| nss | CVE-2020-25648 | MEDIUM | 3.44.0-4.el7 | 3.53.1-7.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json https://access.redhat.com/security/cve/CVE-2020-25648 https://bugzilla.redhat.com/show_bug.cgi?id=1887319 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes https://linux.oracle.com/cve/CVE-2020-25648.html https://linux.oracle.com/errata/ELSA-2021-3572.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/ https://ubuntu.com/security/notices/USN-5410-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| nss | CVE-2020-6829 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-6829 https://bugzilla.mozilla.org/show_bug.cgi?id=1631583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-6829.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss | CVE-2019-11727 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11727 https://bugzilla.mozilla.org/show_bug.cgi?id=1552208 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727 https://linux.oracle.com/cve/CVE-2019-11727.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.gentoo.org/glsa/201908-12 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727 https://www.mozilla.org/security/advisories/mfsa2019-21/
|
| nss | CVE-2019-17023 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17023 https://bugzilla.mozilla.org/show_bug.cgi?id=1590001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://linux.oracle.com/cve/CVE-2019-17023.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4234-1 https://ubuntu.com/security/notices/USN-4397-1 https://usn.ubuntu.com/4234-1/ https://usn.ubuntu.com/4397-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023 https://www.mozilla.org/security/advisories/mfsa2020-01/
|
| nss | CVE-2020-12413 | LOW | 3.44.0-4.el7 | | Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al. Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf https://access.redhat.com/security/cve/CVE-2020-12413
|
| nss-softokn | CVE-2019-11745 | HIGH | 3.44.0-5.el7 | 3.44.0-8.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2020:0243 https://access.redhat.com/errata/RHSA-2020:0466 https://access.redhat.com/security/cve/CVE-2019-11745 https://bugzilla.mozilla.org/show_bug.cgi?id=1586176 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes https://linux.oracle.com/cve/CVE-2019-11745.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202003-02 https://security.gentoo.org/glsa/202003-10 https://security.gentoo.org/glsa/202003-37 https://ubuntu.com/security/notices/USN-4203-1 https://ubuntu.com/security/notices/USN-4203-2 https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://ubuntu.com/security/notices/USN-4241-1 https://ubuntu.com/security/notices/USN-4335-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 https://usn.ubuntu.com/4241-1/ https://usn.ubuntu.com/4335-1/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745 https://www.mozilla.org/security/advisories/mfsa2019-36/ https://www.mozilla.org/security/advisories/mfsa2019-37/ https://www.mozilla.org/security/advisories/mfsa2019-38/
|
| nss-softokn | CVE-2015-2613 | MEDIUM | 3.44.0-5.el7 | | Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html http://rhn.redhat.com/errata/RHSA-2015-1241.html http://rhn.redhat.com/errata/RHSA-2015-1242.html http://rhn.redhat.com/errata/RHSA-2015-1485.html http://rhn.redhat.com/errata/RHSA-2015-1488.html http://www.debian.org/security/2015/dsa-3316 http://www.debian.org/security/2015/dsa-3339 http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA http://www.securityfocus.com/bid/75871 http://www.securitytracker.com/id/1032910 http://www.ubuntu.com/usn/USN-2696-1 http://www.ubuntu.com/usn/USN-2706-1 https://access.redhat.com/security/cve/CVE-2015-2613 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613 https://kc.mcafee.com/corporate/index?page=content&id=SB10139 https://security.gentoo.org/glsa/201603-11 https://security.gentoo.org/glsa/201603-14 https://ubuntu.com/security/notices/USN-2696-1
|
| nss-softokn | CVE-2017-7781 | MEDIUM | 3.44.0-5.el7 | | Expand...http://www.securityfocus.com/bid/100383 http://www.securitytracker.com/id/1039124 https://access.redhat.com/security/cve/CVE-2017-7781 https://bugzilla.mozilla.org/show_bug.cgi?id=1352039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781 https://ubuntu.com/security/notices/USN-3391-1 https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781 https://www.mozilla.org/security/advisories/mfsa2017-18/
|
| nss-softokn | CVE-2019-11719 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11719 https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719 https://linux.oracle.com/cve/CVE-2019-11719.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-softokn | CVE-2019-11729 | MEDIUM | 3.44.0-5.el7 | 3.44.0-8.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/errata/RHSA-2019:4190 https://access.redhat.com/security/cve/CVE-2019-11729 https://bugzilla.mozilla.org/show_bug.cgi?id=1515342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729 https://linux.oracle.com/cve/CVE-2019-11729.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-softokn | CVE-2019-11756 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-11756 https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes https://linux.oracle.com/cve/CVE-2019-11756.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756 https://www.mozilla.org/security/advisories/mfsa2019-36/
|
| nss-softokn | CVE-2019-17006 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17006 https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34 https://linux.oracle.com/cve/CVE-2019-17006.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.netapp.com/advisory/ntap-20210129-0001/ https://ubuntu.com/security/notices/USN-4231-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss-softokn | CVE-2020-12400 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12400 https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12400.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-softokn | CVE-2020-12401 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12401 https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12401.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-softokn | CVE-2020-12402 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html https://access.redhat.com/security/cve/CVE-2020-12402 https://bugzilla.mozilla.org/show_bug.cgi?id=1631597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes https://linux.oracle.com/cve/CVE-2020-12402.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/ https://security.gentoo.org/glsa/202007-10 https://ubuntu.com/security/notices/USN-4417-1 https://ubuntu.com/security/notices/USN-4417-2 https://usn.ubuntu.com/4417-1/ https://usn.ubuntu.com/4417-2/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/security/advisories/mfsa2020-24/
|
| nss-softokn | CVE-2020-12403 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12403 https://bugzilla.redhat.com/show_bug.cgi?id=1868931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12403.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://nvd.nist.gov/vuln/detail/CVE-2020-12403 https://ubuntu.com/security/notices/USN-4476-1
|
| nss-softokn | CVE-2020-6829 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-6829 https://bugzilla.mozilla.org/show_bug.cgi?id=1631583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-6829.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-softokn | CVE-2016-1938 | LOW | 3.44.0-5.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html http://www.debian.org/security/2016/dsa-3688 http://www.mozilla.org/security/announce/2016/mfsa2016-07.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.securityfocus.com/bid/81955 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1034825 http://www.ubuntu.com/usn/USN-2880-1 http://www.ubuntu.com/usn/USN-2880-2 http://www.ubuntu.com/usn/USN-2903-1 http://www.ubuntu.com/usn/USN-2903-2 http://www.ubuntu.com/usn/USN-2973-1 https://access.redhat.com/security/cve/CVE-2016-1938 https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html https://bugzilla.mozilla.org/show_bug.cgi?id=1190248 https://bugzilla.mozilla.org/show_bug.cgi?id=1194947 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c https://security.gentoo.org/glsa/201605-06 https://security.gentoo.org/glsa/201701-46 https://ubuntu.com/security/notices/USN-2880-1 https://ubuntu.com/security/notices/USN-2903-1 https://ubuntu.com/security/notices/USN-2973-1 https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
|
| nss-softokn | CVE-2019-11727 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11727 https://bugzilla.mozilla.org/show_bug.cgi?id=1552208 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727 https://linux.oracle.com/cve/CVE-2019-11727.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.gentoo.org/glsa/201908-12 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727 https://www.mozilla.org/security/advisories/mfsa2019-21/
|
| nss-softokn | CVE-2019-17023 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17023 https://bugzilla.mozilla.org/show_bug.cgi?id=1590001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://linux.oracle.com/cve/CVE-2019-17023.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4234-1 https://ubuntu.com/security/notices/USN-4397-1 https://usn.ubuntu.com/4234-1/ https://usn.ubuntu.com/4397-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023 https://www.mozilla.org/security/advisories/mfsa2020-01/
|
| nss-softokn-freebl | CVE-2019-11745 | HIGH | 3.44.0-5.el7 | 3.44.0-8.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2020:0243 https://access.redhat.com/errata/RHSA-2020:0466 https://access.redhat.com/security/cve/CVE-2019-11745 https://bugzilla.mozilla.org/show_bug.cgi?id=1586176 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes https://linux.oracle.com/cve/CVE-2019-11745.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202003-02 https://security.gentoo.org/glsa/202003-10 https://security.gentoo.org/glsa/202003-37 https://ubuntu.com/security/notices/USN-4203-1 https://ubuntu.com/security/notices/USN-4203-2 https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://ubuntu.com/security/notices/USN-4241-1 https://ubuntu.com/security/notices/USN-4335-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 https://usn.ubuntu.com/4241-1/ https://usn.ubuntu.com/4335-1/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745 https://www.mozilla.org/security/advisories/mfsa2019-36/ https://www.mozilla.org/security/advisories/mfsa2019-37/ https://www.mozilla.org/security/advisories/mfsa2019-38/
|
| nss-softokn-freebl | CVE-2015-2613 | MEDIUM | 3.44.0-5.el7 | | Expand...http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html http://rhn.redhat.com/errata/RHSA-2015-1241.html http://rhn.redhat.com/errata/RHSA-2015-1242.html http://rhn.redhat.com/errata/RHSA-2015-1485.html http://rhn.redhat.com/errata/RHSA-2015-1488.html http://www.debian.org/security/2015/dsa-3316 http://www.debian.org/security/2015/dsa-3339 http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html#AppendixJAVA http://www.securityfocus.com/bid/75871 http://www.securitytracker.com/id/1032910 http://www.ubuntu.com/usn/USN-2696-1 http://www.ubuntu.com/usn/USN-2706-1 https://access.redhat.com/security/cve/CVE-2015-2613 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613 https://kc.mcafee.com/corporate/index?page=content&id=SB10139 https://security.gentoo.org/glsa/201603-11 https://security.gentoo.org/glsa/201603-14 https://ubuntu.com/security/notices/USN-2696-1
|
| nss-softokn-freebl | CVE-2017-7781 | MEDIUM | 3.44.0-5.el7 | | Expand...http://www.securityfocus.com/bid/100383 http://www.securitytracker.com/id/1039124 https://access.redhat.com/security/cve/CVE-2017-7781 https://bugzilla.mozilla.org/show_bug.cgi?id=1352039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7781 https://ubuntu.com/security/notices/USN-3391-1 https://www.mozilla.org/en-US/security/advisories/mfsa2017-18/#CVE-2017-7781 https://www.mozilla.org/security/advisories/mfsa2017-18/
|
| nss-softokn-freebl | CVE-2019-11719 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11719 https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719 https://linux.oracle.com/cve/CVE-2019-11719.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-softokn-freebl | CVE-2019-11729 | MEDIUM | 3.44.0-5.el7 | 3.44.0-8.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/errata/RHSA-2019:4190 https://access.redhat.com/security/cve/CVE-2019-11729 https://bugzilla.mozilla.org/show_bug.cgi?id=1515342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729 https://linux.oracle.com/cve/CVE-2019-11729.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-softokn-freebl | CVE-2019-11756 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-11756 https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes https://linux.oracle.com/cve/CVE-2019-11756.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756 https://www.mozilla.org/security/advisories/mfsa2019-36/
|
| nss-softokn-freebl | CVE-2019-17006 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17006 https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34 https://linux.oracle.com/cve/CVE-2019-17006.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.netapp.com/advisory/ntap-20210129-0001/ https://ubuntu.com/security/notices/USN-4231-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss-softokn-freebl | CVE-2020-12400 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12400 https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12400.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-softokn-freebl | CVE-2020-12401 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12401 https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12401.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-softokn-freebl | CVE-2020-12402 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html https://access.redhat.com/security/cve/CVE-2020-12402 https://bugzilla.mozilla.org/show_bug.cgi?id=1631597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes https://linux.oracle.com/cve/CVE-2020-12402.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/ https://security.gentoo.org/glsa/202007-10 https://ubuntu.com/security/notices/USN-4417-1 https://ubuntu.com/security/notices/USN-4417-2 https://usn.ubuntu.com/4417-1/ https://usn.ubuntu.com/4417-2/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/security/advisories/mfsa2020-24/
|
| nss-softokn-freebl | CVE-2020-12403 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12403 https://bugzilla.redhat.com/show_bug.cgi?id=1868931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12403.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://nvd.nist.gov/vuln/detail/CVE-2020-12403 https://ubuntu.com/security/notices/USN-4476-1
|
| nss-softokn-freebl | CVE-2020-6829 | MEDIUM | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-6829 https://bugzilla.mozilla.org/show_bug.cgi?id=1631583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-6829.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-softokn-freebl | CVE-2016-1938 | LOW | 3.44.0-5.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00010.html http://www.debian.org/security/2016/dsa-3688 http://www.mozilla.org/security/announce/2016/mfsa2016-07.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.securityfocus.com/bid/81955 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1034825 http://www.ubuntu.com/usn/USN-2880-1 http://www.ubuntu.com/usn/USN-2880-2 http://www.ubuntu.com/usn/USN-2903-1 http://www.ubuntu.com/usn/USN-2903-2 http://www.ubuntu.com/usn/USN-2973-1 https://access.redhat.com/security/cve/CVE-2016-1938 https://blog.fuzzing-project.org/37-Mozilla-NSS-Wrong-calculation-results-in-mp_div-and-mp_exptmod.html https://bugzilla.mozilla.org/show_bug.cgi?id=1190248 https://bugzilla.mozilla.org/show_bug.cgi?id=1194947 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.21_release_notes https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_div.c https://github.com/hannob/bignum-fuzz/blob/master/CVE-2016-1938-nss-mp_exptmod.c https://hg.mozilla.org/projects/nss/diff/a555bf0fc23a/lib/freebl/mpi/mpi.c https://security.gentoo.org/glsa/201605-06 https://security.gentoo.org/glsa/201701-46 https://ubuntu.com/security/notices/USN-2880-1 https://ubuntu.com/security/notices/USN-2903-1 https://ubuntu.com/security/notices/USN-2973-1 https://www.mozilla.org/en-US/security/advisories/mfsa2016-07/
|
| nss-softokn-freebl | CVE-2019-11727 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11727 https://bugzilla.mozilla.org/show_bug.cgi?id=1552208 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727 https://linux.oracle.com/cve/CVE-2019-11727.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.gentoo.org/glsa/201908-12 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727 https://www.mozilla.org/security/advisories/mfsa2019-21/
|
| nss-softokn-freebl | CVE-2019-17023 | LOW | 3.44.0-5.el7 | 3.53.1-6.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17023 https://bugzilla.mozilla.org/show_bug.cgi?id=1590001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://linux.oracle.com/cve/CVE-2019-17023.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4234-1 https://ubuntu.com/security/notices/USN-4397-1 https://usn.ubuntu.com/4234-1/ https://usn.ubuntu.com/4397-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023 https://www.mozilla.org/security/advisories/mfsa2020-01/
|
| nss-sysinit | CVE-2021-43527 | CRITICAL | 3.44.0-4.el7 | 3.67.0-4.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json https://access.redhat.com/security/cve/CVE-2021-43527 https://bugzilla.mozilla.org/show_bug.cgi?id=1737470 https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527 https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/ https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/ https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html https://linux.oracle.com/cve/CVE-2021-43527.html https://linux.oracle.com/errata/ELSA-2021-9591.html https://nvd.nist.gov/vuln/detail/CVE-2021-43527 https://security.netapp.com/advisory/ntap-20211229-0002/ https://ubuntu.com/security/notices/USN-5168-1 https://ubuntu.com/security/notices/USN-5168-2 https://ubuntu.com/security/notices/USN-5168-3 https://ubuntu.com/security/notices/USN-5168-4 https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/ https://www.mozilla.org/security/advisories/mfsa2021-51/ https://www.oracle.com/security-alerts/cpuapr2022.html
|
| nss-sysinit | CVE-2019-11745 | HIGH | 3.44.0-4.el7 | 3.44.0-7.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2020:0243 https://access.redhat.com/errata/RHSA-2020:0466 https://access.redhat.com/security/cve/CVE-2019-11745 https://bugzilla.mozilla.org/show_bug.cgi?id=1586176 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes https://linux.oracle.com/cve/CVE-2019-11745.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202003-02 https://security.gentoo.org/glsa/202003-10 https://security.gentoo.org/glsa/202003-37 https://ubuntu.com/security/notices/USN-4203-1 https://ubuntu.com/security/notices/USN-4203-2 https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://ubuntu.com/security/notices/USN-4241-1 https://ubuntu.com/security/notices/USN-4335-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 https://usn.ubuntu.com/4241-1/ https://usn.ubuntu.com/4335-1/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745 https://www.mozilla.org/security/advisories/mfsa2019-36/ https://www.mozilla.org/security/advisories/mfsa2019-37/ https://www.mozilla.org/security/advisories/mfsa2019-38/
|
| nss-sysinit | CVE-2015-2808 | MEDIUM | 3.44.0-4.el7 | | Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html http://marc.info/?l=bugtraq&m=143456209711959&w=2 http://marc.info/?l=bugtraq&m=143629696317098&w=2 http://marc.info/?l=bugtraq&m=143741441012338&w=2 http://marc.info/?l=bugtraq&m=143817021313142&w=2 http://marc.info/?l=bugtraq&m=143817899717054&w=2 http://marc.info/?l=bugtraq&m=143818140118771&w=2 http://marc.info/?l=bugtraq&m=144043644216842&w=2 http://marc.info/?l=bugtraq&m=144059660127919&w=2 http://marc.info/?l=bugtraq&m=144059703728085&w=2 http://marc.info/?l=bugtraq&m=144060576831314&w=2 http://marc.info/?l=bugtraq&m=144060606031437&w=2 http://marc.info/?l=bugtraq&m=144069189622016&w=2 http://marc.info/?l=bugtraq&m=144102017024820&w=2 http://marc.info/?l=bugtraq&m=144104533800819&w=2 http://marc.info/?l=bugtraq&m=144104565600964&w=2 http://marc.info/?l=bugtraq&m=144493176821532&w=2 http://rhn.redhat.com/errata/RHSA-2015-1006.html http://rhn.redhat.com/errata/RHSA-2015-1007.html http://rhn.redhat.com/errata/RHSA-2015-1020.html http://rhn.redhat.com/errata/RHSA-2015-1021.html http://rhn.redhat.com/errata/RHSA-2015-1091.html http://rhn.redhat.com/errata/RHSA-2015-1228.html http://rhn.redhat.com/errata/RHSA-2015-1229.html http://rhn.redhat.com/errata/RHSA-2015-1230.html http://rhn.redhat.com/errata/RHSA-2015-1241.html http://rhn.redhat.com/errata/RHSA-2015-1242.html http://rhn.redhat.com/errata/RHSA-2015-1243.html http://rhn.redhat.com/errata/RHSA-2015-1526.html http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888 http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892 http://www-01.ibm.com/support/docview.wss?uid=swg21883640 http://www-304.ibm.com/support/docview.wss?uid=swg21903565 http://www-304.ibm.com/support/docview.wss?uid=swg21960015 http://www-304.ibm.com/support/docview.wss?uid=swg21960769 http://www.debian.org/security/2015/dsa-3316 http://www.debian.org/security/2015/dsa-3339 http://www.huawei.com/en/psirt/security-advisories/hw-454055 http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.securityfocus.com/bid/73684 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1032599 http://www.securitytracker.com/id/1032600 http://www.securitytracker.com/id/1032707 http://www.securitytracker.com/id/1032708 http://www.securitytracker.com/id/1032734 http://www.securitytracker.com/id/1032788 http://www.securitytracker.com/id/1032858 http://www.securitytracker.com/id/1032868 http://www.securitytracker.com/id/1032910 http://www.securitytracker.com/id/1032990 http://www.securitytracker.com/id/1033071 http://www.securitytracker.com/id/1033072 http://www.securitytracker.com/id/1033386 http://www.securitytracker.com/id/1033415 http://www.securitytracker.com/id/1033431 http://www.securitytracker.com/id/1033432 http://www.securitytracker.com/id/1033737 http://www.securitytracker.com/id/1033769 http://www.securitytracker.com/id/1036222 http://www.ubuntu.com/usn/USN-2696-1 http://www.ubuntu.com/usn/USN-2706-1 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm https://access.redhat.com/security/cve/CVE-2015-2808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888 https://kb.juniper.net/JSA10783 https://kc.mcafee.com/corporate/index?page=content&id=SB10163 https://linux.oracle.com/cve/CVE-2015-2808.html https://linux.oracle.com/errata/ELSA-2015-1526.html https://security.gentoo.org/glsa/201512-10 https://ubuntu.com/security/notices/USN-2696-1 https://ubuntu.com/security/notices/USN-2706-1 https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709 https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
|
| nss-sysinit | CVE-2016-2183 | MEDIUM | 3.44.0-4.el7 | | Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html http://rhn.redhat.com/errata/RHSA-2017-0336.html http://rhn.redhat.com/errata/RHSA-2017-0337.html http://rhn.redhat.com/errata/RHSA-2017-0338.html http://rhn.redhat.com/errata/RHSA-2017-0462.html http://seclists.org/fulldisclosure/2017/Jul/31 http://seclists.org/fulldisclosure/2017/May/105 http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 http://www-01.ibm.com/support/docview.wss?uid=swg21991482 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/542005/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded http://www.securityfocus.com/bid/92630 http://www.securityfocus.com/bid/95568 http://www.securitytracker.com/id/1036696 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 http://www.ubuntu.com/usn/USN-3179-1 http://www.ubuntu.com/usn/USN-3194-1 http://www.ubuntu.com/usn/USN-3198-1 http://www.ubuntu.com/usn/USN-3270-1 http://www.ubuntu.com/usn/USN-3372-1 https://access.redhat.com/articles/2548661 https://access.redhat.com/errata/RHSA-2016:1940 https://access.redhat.com/errata/RHSA-2017:1216 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2018:2123 https://access.redhat.com/errata/RHSA-2019:1245 https://access.redhat.com/errata/RHSA-2019:2859 https://access.redhat.com/errata/RHSA-2020:0451 https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/cve/cve-2016-2183 https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ https://bto.bluecoat.com/security-advisory/sa133 https://bugzilla.redhat.com/show_bug.cgi?id=1369383 https://community.qualys.com/thread/16555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10186 https://kc.mcafee.com/corporate/index?page=content&id=SB10197 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://kc.mcafee.com/corporate/index?page=content&id=SB10310 https://linux.oracle.com/cve/CVE-2016-2183.html https://linux.oracle.com/errata/ELSA-2018-2123.html https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575 https://seclists.org/bugtraq/2018/Nov/21 https://security-tracker.debian.org/tracker/CVE-2016-2183 https://security.gentoo.org/glsa/201612-16 https://security.gentoo.org/glsa/201701-65 https://security.gentoo.org/glsa/201707-01 https://security.netapp.com/advisory/ntap-20160915-0001/ https://security.netapp.com/advisory/ntap-20170119-0001/ https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 https://support.f5.com/csp/article/K13167034 https://sweet32.info/ https://twitter.com/symantec/status/768786631159603200 https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3179-1 https://ubuntu.com/security/notices/USN-3194-1 https://ubuntu.com/security/notices/USN-3198-1 https://ubuntu.com/security/notices/USN-3270-1 https://ubuntu.com/security/notices/USN-3372-1 https://wiki.opendaylight.org/view/Security_Advisories https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.exploit-db.com/exploits/42091/ https://www.ietf.org/mail-archive/web/tls/current/msg04560.html https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.sigsac.org/ccs/CCS2016/accepted-papers/ https://www.suse.com/security/cve/CVE-2016-2183.html https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21 https://www.tenable.com/security/tns-2017-09 https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
| nss-sysinit | CVE-2016-9074 | MEDIUM | 3.44.0-4.el7 | | Expand...http://www.securityfocus.com/bid/94341 http://www.securitytracker.com/id/1037298 https://access.redhat.com/security/cve/CVE-2016-9074 https://bugzilla.mozilla.org/show_bug.cgi?id=1293334 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074 https://security.gentoo.org/glsa/201701-15 https://security.gentoo.org/glsa/201701-46 https://ubuntu.com/security/notices/USN-3163-1 https://www.debian.org/security/2016/dsa-3730 https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074 https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/ https://www.mozilla.org/security/advisories/mfsa2016-89/ https://www.mozilla.org/security/advisories/mfsa2016-90/ https://www.mozilla.org/security/advisories/mfsa2016-93/
|
| nss-sysinit | CVE-2016-9574 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2016-9574 https://bugzilla.mozilla.org/show_bug.cgi?id=1320695 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
|
| nss-sysinit | CVE-2018-18508 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-18508 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes https://linux.oracle.com/cve/CVE-2018-18508.html https://linux.oracle.com/errata/ELSA-2019-1951.html https://ubuntu.com/security/notices/USN-3898-1 https://ubuntu.com/security/notices/USN-3898-2 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss-sysinit | CVE-2019-11719 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11719 https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719 https://linux.oracle.com/cve/CVE-2019-11719.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-sysinit | CVE-2019-11729 | MEDIUM | 3.44.0-4.el7 | 3.44.0-7.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/errata/RHSA-2019:4190 https://access.redhat.com/security/cve/CVE-2019-11729 https://bugzilla.mozilla.org/show_bug.cgi?id=1515342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729 https://linux.oracle.com/cve/CVE-2019-11729.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-sysinit | CVE-2019-11756 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-11756 https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes https://linux.oracle.com/cve/CVE-2019-11756.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756 https://www.mozilla.org/security/advisories/mfsa2019-36/
|
| nss-sysinit | CVE-2019-17006 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17006 https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34 https://linux.oracle.com/cve/CVE-2019-17006.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.netapp.com/advisory/ntap-20210129-0001/ https://ubuntu.com/security/notices/USN-4231-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss-sysinit | CVE-2020-12399 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-12399 https://bugzilla.mozilla.org/show_bug.cgi?id=1631576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202007-49 https://ubuntu.com/security/notices/USN-4383-1 https://ubuntu.com/security/notices/USN-4397-1 https://ubuntu.com/security/notices/USN-4397-2 https://ubuntu.com/security/notices/USN-4421-1 https://usn.ubuntu.com/4421-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399 https://www.mozilla.org/security/advisories/mfsa2020-20/ https://www.mozilla.org/security/advisories/mfsa2020-21/ https://www.mozilla.org/security/advisories/mfsa2020-22/
|
| nss-sysinit | CVE-2020-12400 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12400 https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12400.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-sysinit | CVE-2020-12401 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12401 https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12401.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-sysinit | CVE-2020-12402 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html https://access.redhat.com/security/cve/CVE-2020-12402 https://bugzilla.mozilla.org/show_bug.cgi?id=1631597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes https://linux.oracle.com/cve/CVE-2020-12402.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/ https://security.gentoo.org/glsa/202007-10 https://ubuntu.com/security/notices/USN-4417-1 https://ubuntu.com/security/notices/USN-4417-2 https://usn.ubuntu.com/4417-1/ https://usn.ubuntu.com/4417-2/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/security/advisories/mfsa2020-24/
|
| nss-sysinit | CVE-2020-12403 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12403 https://bugzilla.redhat.com/show_bug.cgi?id=1868931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12403.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://nvd.nist.gov/vuln/detail/CVE-2020-12403 https://ubuntu.com/security/notices/USN-4476-1
|
| nss-sysinit | CVE-2020-25648 | MEDIUM | 3.44.0-4.el7 | 3.53.1-7.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json https://access.redhat.com/security/cve/CVE-2020-25648 https://bugzilla.redhat.com/show_bug.cgi?id=1887319 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes https://linux.oracle.com/cve/CVE-2020-25648.html https://linux.oracle.com/errata/ELSA-2021-3572.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/ https://ubuntu.com/security/notices/USN-5410-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| nss-sysinit | CVE-2020-6829 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-6829 https://bugzilla.mozilla.org/show_bug.cgi?id=1631583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-6829.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-sysinit | CVE-2019-11727 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11727 https://bugzilla.mozilla.org/show_bug.cgi?id=1552208 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727 https://linux.oracle.com/cve/CVE-2019-11727.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.gentoo.org/glsa/201908-12 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727 https://www.mozilla.org/security/advisories/mfsa2019-21/
|
| nss-sysinit | CVE-2019-17023 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17023 https://bugzilla.mozilla.org/show_bug.cgi?id=1590001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://linux.oracle.com/cve/CVE-2019-17023.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4234-1 https://ubuntu.com/security/notices/USN-4397-1 https://usn.ubuntu.com/4234-1/ https://usn.ubuntu.com/4397-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023 https://www.mozilla.org/security/advisories/mfsa2020-01/
|
| nss-sysinit | CVE-2020-12413 | LOW | 3.44.0-4.el7 | | Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al. Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf https://access.redhat.com/security/cve/CVE-2020-12413
|
| nss-tools | CVE-2021-43527 | CRITICAL | 3.44.0-4.el7 | 3.67.0-4.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43527.json https://access.redhat.com/security/cve/CVE-2021-43527 https://bugzilla.mozilla.org/show_bug.cgi?id=1737470 https://cert-portal.siemens.com/productcert/pdf/ssa-594438.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527 https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_68_1_RTM/ https://ftp.mozilla.org/pub/security/nss/releases/NSS_3_73_RTM/ https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html https://linux.oracle.com/cve/CVE-2021-43527.html https://linux.oracle.com/errata/ELSA-2021-9591.html https://nvd.nist.gov/vuln/detail/CVE-2021-43527 https://security.netapp.com/advisory/ntap-20211229-0002/ https://ubuntu.com/security/notices/USN-5168-1 https://ubuntu.com/security/notices/USN-5168-2 https://ubuntu.com/security/notices/USN-5168-3 https://ubuntu.com/security/notices/USN-5168-4 https://www.mozilla.org/en-US/security/advisories/mfsa2021-51/ https://www.mozilla.org/security/advisories/mfsa2021-51/ https://www.oracle.com/security-alerts/cpuapr2022.html
|
| nss-tools | CVE-2019-11745 | HIGH | 3.44.0-4.el7 | 3.44.0-7.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2020:0243 https://access.redhat.com/errata/RHSA-2020:0466 https://access.redhat.com/security/cve/CVE-2019-11745 https://bugzilla.mozilla.org/show_bug.cgi?id=1586176 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes https://linux.oracle.com/cve/CVE-2019-11745.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202003-02 https://security.gentoo.org/glsa/202003-10 https://security.gentoo.org/glsa/202003-37 https://ubuntu.com/security/notices/USN-4203-1 https://ubuntu.com/security/notices/USN-4203-2 https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://ubuntu.com/security/notices/USN-4241-1 https://ubuntu.com/security/notices/USN-4335-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 https://usn.ubuntu.com/4241-1/ https://usn.ubuntu.com/4335-1/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745 https://www.mozilla.org/security/advisories/mfsa2019-36/ https://www.mozilla.org/security/advisories/mfsa2019-37/ https://www.mozilla.org/security/advisories/mfsa2019-38/
|
| nss-tools | CVE-2015-2808 | MEDIUM | 3.44.0-4.el7 | | Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html http://marc.info/?l=bugtraq&m=143456209711959&w=2 http://marc.info/?l=bugtraq&m=143629696317098&w=2 http://marc.info/?l=bugtraq&m=143741441012338&w=2 http://marc.info/?l=bugtraq&m=143817021313142&w=2 http://marc.info/?l=bugtraq&m=143817899717054&w=2 http://marc.info/?l=bugtraq&m=143818140118771&w=2 http://marc.info/?l=bugtraq&m=144043644216842&w=2 http://marc.info/?l=bugtraq&m=144059660127919&w=2 http://marc.info/?l=bugtraq&m=144059703728085&w=2 http://marc.info/?l=bugtraq&m=144060576831314&w=2 http://marc.info/?l=bugtraq&m=144060606031437&w=2 http://marc.info/?l=bugtraq&m=144069189622016&w=2 http://marc.info/?l=bugtraq&m=144102017024820&w=2 http://marc.info/?l=bugtraq&m=144104533800819&w=2 http://marc.info/?l=bugtraq&m=144104565600964&w=2 http://marc.info/?l=bugtraq&m=144493176821532&w=2 http://rhn.redhat.com/errata/RHSA-2015-1006.html http://rhn.redhat.com/errata/RHSA-2015-1007.html http://rhn.redhat.com/errata/RHSA-2015-1020.html http://rhn.redhat.com/errata/RHSA-2015-1021.html http://rhn.redhat.com/errata/RHSA-2015-1091.html http://rhn.redhat.com/errata/RHSA-2015-1228.html http://rhn.redhat.com/errata/RHSA-2015-1229.html http://rhn.redhat.com/errata/RHSA-2015-1230.html http://rhn.redhat.com/errata/RHSA-2015-1241.html http://rhn.redhat.com/errata/RHSA-2015-1242.html http://rhn.redhat.com/errata/RHSA-2015-1243.html http://rhn.redhat.com/errata/RHSA-2015-1526.html http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888 http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892 http://www-01.ibm.com/support/docview.wss?uid=swg21883640 http://www-304.ibm.com/support/docview.wss?uid=swg21903565 http://www-304.ibm.com/support/docview.wss?uid=swg21960015 http://www-304.ibm.com/support/docview.wss?uid=swg21960769 http://www.debian.org/security/2015/dsa-3316 http://www.debian.org/security/2015/dsa-3339 http://www.huawei.com/en/psirt/security-advisories/hw-454055 http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.securityfocus.com/bid/73684 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1032599 http://www.securitytracker.com/id/1032600 http://www.securitytracker.com/id/1032707 http://www.securitytracker.com/id/1032708 http://www.securitytracker.com/id/1032734 http://www.securitytracker.com/id/1032788 http://www.securitytracker.com/id/1032858 http://www.securitytracker.com/id/1032868 http://www.securitytracker.com/id/1032910 http://www.securitytracker.com/id/1032990 http://www.securitytracker.com/id/1033071 http://www.securitytracker.com/id/1033072 http://www.securitytracker.com/id/1033386 http://www.securitytracker.com/id/1033415 http://www.securitytracker.com/id/1033431 http://www.securitytracker.com/id/1033432 http://www.securitytracker.com/id/1033737 http://www.securitytracker.com/id/1033769 http://www.securitytracker.com/id/1036222 http://www.ubuntu.com/usn/USN-2696-1 http://www.ubuntu.com/usn/USN-2706-1 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm https://access.redhat.com/security/cve/CVE-2015-2808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888 https://kb.juniper.net/JSA10783 https://kc.mcafee.com/corporate/index?page=content&id=SB10163 https://linux.oracle.com/cve/CVE-2015-2808.html https://linux.oracle.com/errata/ELSA-2015-1526.html https://security.gentoo.org/glsa/201512-10 https://ubuntu.com/security/notices/USN-2696-1 https://ubuntu.com/security/notices/USN-2706-1 https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709 https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
|
| nss-tools | CVE-2016-2183 | MEDIUM | 3.44.0-4.el7 | | Expand...http://hg.openjdk.java.net/jdk8u/jdk8u/jdk/rev/5d2bb853ae31 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759 http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html http://rhn.redhat.com/errata/RHSA-2017-0336.html http://rhn.redhat.com/errata/RHSA-2017-0337.html http://rhn.redhat.com/errata/RHSA-2017-0338.html http://rhn.redhat.com/errata/RHSA-2017-0462.html http://seclists.org/fulldisclosure/2017/Jul/31 http://seclists.org/fulldisclosure/2017/May/105 http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697 http://www-01.ibm.com/support/docview.wss?uid=swg21991482 http://www-01.ibm.com/support/docview.wss?uid=swg21995039 http://www.debian.org/security/2016/dsa-3673 http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html http://www.securityfocus.com/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/542005/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded http://www.securityfocus.com/bid/92630 http://www.securityfocus.com/bid/95568 http://www.securitytracker.com/id/1036696 http://www.splunk.com/view/SP-CAAAPSV http://www.splunk.com/view/SP-CAAAPUE http://www.ubuntu.com/usn/USN-3087-1 http://www.ubuntu.com/usn/USN-3087-2 http://www.ubuntu.com/usn/USN-3179-1 http://www.ubuntu.com/usn/USN-3194-1 http://www.ubuntu.com/usn/USN-3198-1 http://www.ubuntu.com/usn/USN-3270-1 http://www.ubuntu.com/usn/USN-3372-1 https://access.redhat.com/articles/2548661 https://access.redhat.com/errata/RHSA-2016:1940 https://access.redhat.com/errata/RHSA-2017:1216 https://access.redhat.com/errata/RHSA-2017:2708 https://access.redhat.com/errata/RHSA-2017:2709 https://access.redhat.com/errata/RHSA-2017:2710 https://access.redhat.com/errata/RHSA-2017:3113 https://access.redhat.com/errata/RHSA-2017:3114 https://access.redhat.com/errata/RHSA-2017:3239 https://access.redhat.com/errata/RHSA-2017:3240 https://access.redhat.com/errata/RHSA-2018:2123 https://access.redhat.com/errata/RHSA-2019:1245 https://access.redhat.com/errata/RHSA-2019:2859 https://access.redhat.com/errata/RHSA-2020:0451 https://access.redhat.com/security/cve/CVE-2016-2183 https://access.redhat.com/security/cve/cve-2016-2183 https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/ https://bto.bluecoat.com/security-advisory/sa133 https://bugzilla.redhat.com/show_bug.cgi?id=1369383 https://community.qualys.com/thread/16555 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183 https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312 https://kc.mcafee.com/corporate/index?page=content&id=SB10171 https://kc.mcafee.com/corporate/index?page=content&id=SB10186 https://kc.mcafee.com/corporate/index?page=content&id=SB10197 https://kc.mcafee.com/corporate/index?page=content&id=SB10215 https://kc.mcafee.com/corporate/index?page=content&id=SB10310 https://linux.oracle.com/cve/CVE-2016-2183.html https://linux.oracle.com/errata/ELSA-2018-2123.html https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/ https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/ https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb05575 https://seclists.org/bugtraq/2018/Nov/21 https://security-tracker.debian.org/tracker/CVE-2016-2183 https://security.gentoo.org/glsa/201612-16 https://security.gentoo.org/glsa/201701-65 https://security.gentoo.org/glsa/201707-01 https://security.netapp.com/advisory/ntap-20160915-0001/ https://security.netapp.com/advisory/ntap-20170119-0001/ https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613 https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178 https://support.f5.com/csp/article/K13167034 https://sweet32.info/ https://twitter.com/symantec/status/768786631159603200 https://ubuntu.com/security/notices/USN-3087-1 https://ubuntu.com/security/notices/USN-3179-1 https://ubuntu.com/security/notices/USN-3194-1 https://ubuntu.com/security/notices/USN-3198-1 https://ubuntu.com/security/notices/USN-3270-1 https://ubuntu.com/security/notices/USN-3372-1 https://wiki.opendaylight.org/view/Security_Advisories https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24 https://www.exploit-db.com/exploits/42091/ https://www.ietf.org/mail-archive/web/tls/current/msg04560.html https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008 https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/ https://www.openssl.org/blog/blog/2016/08/24/sweet32/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html https://www.sigsac.org/ccs/CCS2016/accepted-papers/ https://www.suse.com/security/cve/CVE-2016-2183.html https://www.tenable.com/security/tns-2016-16 https://www.tenable.com/security/tns-2016-20 https://www.tenable.com/security/tns-2016-21 https://www.tenable.com/security/tns-2017-09 https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
|
| nss-tools | CVE-2016-9074 | MEDIUM | 3.44.0-4.el7 | | Expand...http://www.securityfocus.com/bid/94341 http://www.securitytracker.com/id/1037298 https://access.redhat.com/security/cve/CVE-2016-9074 https://bugzilla.mozilla.org/show_bug.cgi?id=1293334 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074 https://security.gentoo.org/glsa/201701-15 https://security.gentoo.org/glsa/201701-46 https://ubuntu.com/security/notices/USN-3163-1 https://www.debian.org/security/2016/dsa-3730 https://www.mozilla.org/en-US/security/advisories/mfsa2016-89/#CVE-2016-9074 https://www.mozilla.org/en-US/security/advisories/mfsa2016-90/ https://www.mozilla.org/security/advisories/mfsa2016-89/ https://www.mozilla.org/security/advisories/mfsa2016-90/ https://www.mozilla.org/security/advisories/mfsa2016-93/
|
| nss-tools | CVE-2016-9574 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2016-9574 https://bugzilla.mozilla.org/show_bug.cgi?id=1320695 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9574
|
| nss-tools | CVE-2018-18508 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-18508 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18508 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.36.7_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.41.1_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.42.1_release_notes https://linux.oracle.com/cve/CVE-2018-18508.html https://linux.oracle.com/errata/ELSA-2019-1951.html https://ubuntu.com/security/notices/USN-3898-1 https://ubuntu.com/security/notices/USN-3898-2 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss-tools | CVE-2019-11719 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11719 https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719 https://linux.oracle.com/cve/CVE-2019-11719.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-tools | CVE-2019-11729 | MEDIUM | 3.44.0-4.el7 | 3.44.0-7.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/errata/RHSA-2019:4190 https://access.redhat.com/security/cve/CVE-2019-11729 https://bugzilla.mozilla.org/show_bug.cgi?id=1515342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729 https://linux.oracle.com/cve/CVE-2019-11729.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-tools | CVE-2019-11756 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-11756 https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes https://linux.oracle.com/cve/CVE-2019-11756.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756 https://www.mozilla.org/security/advisories/mfsa2019-36/
|
| nss-tools | CVE-2019-17006 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17006 https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34 https://linux.oracle.com/cve/CVE-2019-17006.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.netapp.com/advisory/ntap-20210129-0001/ https://ubuntu.com/security/notices/USN-4231-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss-tools | CVE-2020-12399 | MEDIUM | 3.44.0-4.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-12399 https://bugzilla.mozilla.org/show_bug.cgi?id=1631576 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.4_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.52.1_release_notes https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202007-49 https://ubuntu.com/security/notices/USN-4383-1 https://ubuntu.com/security/notices/USN-4397-1 https://ubuntu.com/security/notices/USN-4397-2 https://ubuntu.com/security/notices/USN-4421-1 https://usn.ubuntu.com/4421-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-20/#CVE-2020-12399 https://www.mozilla.org/security/advisories/mfsa2020-20/ https://www.mozilla.org/security/advisories/mfsa2020-21/ https://www.mozilla.org/security/advisories/mfsa2020-22/
|
| nss-tools | CVE-2020-12400 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12400 https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12400.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-tools | CVE-2020-12401 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12401 https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12401.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-tools | CVE-2020-12402 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html https://access.redhat.com/security/cve/CVE-2020-12402 https://bugzilla.mozilla.org/show_bug.cgi?id=1631597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes https://linux.oracle.com/cve/CVE-2020-12402.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/ https://security.gentoo.org/glsa/202007-10 https://ubuntu.com/security/notices/USN-4417-1 https://ubuntu.com/security/notices/USN-4417-2 https://usn.ubuntu.com/4417-1/ https://usn.ubuntu.com/4417-2/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/security/advisories/mfsa2020-24/
|
| nss-tools | CVE-2020-12403 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12403 https://bugzilla.redhat.com/show_bug.cgi?id=1868931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12403.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://nvd.nist.gov/vuln/detail/CVE-2020-12403 https://ubuntu.com/security/notices/USN-4476-1
|
| nss-tools | CVE-2020-25648 | MEDIUM | 3.44.0-4.el7 | 3.53.1-7.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25648.json https://access.redhat.com/security/cve/CVE-2020-25648 https://bugzilla.redhat.com/show_bug.cgi?id=1887319 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes https://linux.oracle.com/cve/CVE-2020-25648.html https://linux.oracle.com/errata/ELSA-2021-3572.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERA5SVJQXQMDGES7RIT4F4NQVLD35RXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HRM53IQCPZT2US3M7JXTP6I6IBA5RGOD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPOLN6DJUYQ3QBQEGLZGV73SNIPK7GHV/ https://ubuntu.com/security/notices/USN-5410-1 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| nss-tools | CVE-2020-6829 | MEDIUM | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-6829 https://bugzilla.mozilla.org/show_bug.cgi?id=1631583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-6829.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-tools | CVE-2019-11727 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11727 https://bugzilla.mozilla.org/show_bug.cgi?id=1552208 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727 https://linux.oracle.com/cve/CVE-2019-11727.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.gentoo.org/glsa/201908-12 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727 https://www.mozilla.org/security/advisories/mfsa2019-21/
|
| nss-tools | CVE-2019-17023 | LOW | 3.44.0-4.el7 | 3.53.1-3.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17023 https://bugzilla.mozilla.org/show_bug.cgi?id=1590001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://linux.oracle.com/cve/CVE-2019-17023.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4234-1 https://ubuntu.com/security/notices/USN-4397-1 https://usn.ubuntu.com/4234-1/ https://usn.ubuntu.com/4397-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023 https://www.mozilla.org/security/advisories/mfsa2020-01/
|
| nss-tools | CVE-2020-12413 | LOW | 3.44.0-4.el7 | | Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al. Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf https://access.redhat.com/security/cve/CVE-2020-12413
|
| nss-util | CVE-2019-11745 | HIGH | 3.44.0-3.el7 | 3.44.0-4.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2020:0243 https://access.redhat.com/errata/RHSA-2020:0466 https://access.redhat.com/security/cve/CVE-2019-11745 https://bugzilla.mozilla.org/show_bug.cgi?id=1586176 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.44.3_release_notes https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47.1_release_notes https://linux.oracle.com/cve/CVE-2019-11745.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/202003-02 https://security.gentoo.org/glsa/202003-10 https://security.gentoo.org/glsa/202003-37 https://ubuntu.com/security/notices/USN-4203-1 https://ubuntu.com/security/notices/USN-4203-2 https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://ubuntu.com/security/notices/USN-4241-1 https://ubuntu.com/security/notices/USN-4335-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04 https://usn.ubuntu.com/4241-1/ https://usn.ubuntu.com/4335-1/ https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-11745 https://www.mozilla.org/security/advisories/mfsa2019-36/ https://www.mozilla.org/security/advisories/mfsa2019-37/ https://www.mozilla.org/security/advisories/mfsa2019-38/
|
| nss-util | CVE-2019-11719 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11719 https://bugzilla.mozilla.org/show_bug.cgi?id=1540541 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11719 https://linux.oracle.com/cve/CVE-2019-11719.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11719 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11719 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-util | CVE-2019-11729 | MEDIUM | 3.44.0-3.el7 | 3.44.0-4.el7_7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/errata/RHSA-2019:4190 https://access.redhat.com/security/cve/CVE-2019-11729 https://bugzilla.mozilla.org/show_bug.cgi?id=1515342 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11729 https://linux.oracle.com/cve/CVE-2019-11729.html https://linux.oracle.com/errata/ELSA-2019-4190.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://security.gentoo.org/glsa/201908-12 https://security.gentoo.org/glsa/201908-20 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://ubuntu.com/security/notices/USN-4060-2 https://ubuntu.com/security/notices/USN-4064-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11729 https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11729 https://www.mozilla.org/security/advisories/mfsa2019-21/ https://www.mozilla.org/security/advisories/mfsa2019-22/ https://www.mozilla.org/security/advisories/mfsa2019-23/
|
| nss-util | CVE-2019-11756 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-11756 https://bugzilla.mozilla.org/show_bug.cgi?id=1508776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.47_release_notes https://linux.oracle.com/cve/CVE-2019-11756.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4216-1 https://ubuntu.com/security/notices/USN-4216-2 https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-11756 https://www.mozilla.org/security/advisories/mfsa2019-36/
|
| nss-util | CVE-2019-17006 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17006 https://bugzilla.mozilla.org/show_bug.cgi?id=1539788 https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.46_release_notes https://hg.mozilla.org/projects/nss/rev/9d1f5e71773d4e3146524096d74cb96c8df51abe https://hg.mozilla.org/projects/nss/rev/dfd6996fe7425eb0437346d11a01082f16fcfe34 https://linux.oracle.com/cve/CVE-2019-17006.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.netapp.com/advisory/ntap-20210129-0001/ https://ubuntu.com/security/notices/USN-4231-1 https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
|
| nss-util | CVE-2020-12400 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12400 https://bugzilla.mozilla.org/show_bug.cgi?id=1623116 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12400.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12400 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-util | CVE-2020-12401 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12401 https://bugzilla.mozilla.org/show_bug.cgi?id=1631573 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12401.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-12401 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-util | CVE-2020-12402 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00016.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00027.html http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00049.html https://access.redhat.com/security/cve/CVE-2020-12402 https://bugzilla.mozilla.org/show_bug.cgi?id=1631597 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53.1_release_notes https://linux.oracle.com/cve/CVE-2020-12402.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RFL6UNFK4MG2WDXLMLFAEIUSM5EUK7CG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UWVDJRARXNWWWTCGMM63EXLQHH2LNOXO/ https://security.gentoo.org/glsa/202007-10 https://ubuntu.com/security/notices/USN-4417-1 https://ubuntu.com/security/notices/USN-4417-2 https://usn.ubuntu.com/4417-1/ https://usn.ubuntu.com/4417-2/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/security/advisories/mfsa2020-24/
|
| nss-util | CVE-2020-12403 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-12403 https://bugzilla.redhat.com/show_bug.cgi?id=1868931 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-12403.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://nvd.nist.gov/vuln/detail/CVE-2020-12403 https://ubuntu.com/security/notices/USN-4476-1
|
| nss-util | CVE-2020-6829 | MEDIUM | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-6829 https://bugzilla.mozilla.org/show_bug.cgi?id=1631583 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.55_release_notes https://linux.oracle.com/cve/CVE-2020-6829.html https://linux.oracle.com/errata/ELSA-2021-0538.html https://ubuntu.com/security/notices/USN-4455-1 https://ubuntu.com/security/notices/USN-4474-1 https://www.mozilla.org/en-US/security/advisories/mfsa2020-36/#CVE-2020-6829 https://www.mozilla.org/security/advisories/mfsa2020-36/ https://www.mozilla.org/security/advisories/mfsa2020-39/
|
| nss-util | CVE-2019-11727 | LOW | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00006.html https://access.redhat.com/errata/RHSA-2019:1951 https://access.redhat.com/security/cve/CVE-2019-11727 https://bugzilla.mozilla.org/show_bug.cgi?id=1552208 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11727 https://linux.oracle.com/cve/CVE-2019-11727.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://security.gentoo.org/glsa/201908-12 https://ubuntu.com/security/notices/USN-4054-1 https://ubuntu.com/security/notices/USN-4060-1 https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11727 https://www.mozilla.org/security/advisories/mfsa2019-21/
|
| nss-util | CVE-2019-17023 | LOW | 3.44.0-3.el7 | 3.53.1-1.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2019-17023 https://bugzilla.mozilla.org/show_bug.cgi?id=1590001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023 https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes https://linux.oracle.com/cve/CVE-2019-17023.html https://linux.oracle.com/errata/ELSA-2020-4076.html https://ubuntu.com/security/notices/USN-4234-1 https://ubuntu.com/security/notices/USN-4397-1 https://usn.ubuntu.com/4234-1/ https://usn.ubuntu.com/4397-1/ https://www.debian.org/security/2020/dsa-4726 https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/#CVE-2019-17023 https://www.mozilla.org/security/advisories/mfsa2020-01/
|
| openldap | CVE-2019-13057 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html http://seclists.org/fulldisclosure/2019/Dec/26 http://www.openldap.org/lists/openldap-announce/201907/msg00001.html https://access.redhat.com/security/cve/CVE-2019-13057 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13057 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html https://openldap.org/its/?findid=9038 https://seclists.org/bugtraq/2019/Dec/23 https://security.netapp.com/advisory/ntap-20190822-0004/ https://support.apple.com/kb/HT210788 https://ubuntu.com/security/notices/USN-4078-1 https://ubuntu.com/security/notices/USN-4078-2 https://usn.ubuntu.com/4078-1/ https://usn.ubuntu.com/4078-2/ https://www.openldap.org/its/?findid=9038 https://www.openldap.org/lists/openldap-announce/201907/msg00001.html https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openldap | CVE-2019-13565 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00058.html http://seclists.org/fulldisclosure/2019/Dec/26 http://www.openldap.org/lists/openldap-announce/201907/msg00001.html https://access.redhat.com/security/cve/CVE-2019-13565 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13565 https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/08/msg00024.html https://openldap.org/its/?findid=9052 https://seclists.org/bugtraq/2019/Dec/23 https://support.apple.com/kb/HT210788 https://support.f5.com/csp/article/K98008862?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4078-1 https://ubuntu.com/security/notices/USN-4078-2 https://usn.ubuntu.com/4078-1/ https://usn.ubuntu.com/4078-2/ https://www.openldap.org/its/index.cgi/?findid=9052 https://www.openldap.org/lists/openldap-announce/201907/msg00001.html https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openldap | CVE-2020-12243 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-22.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00016.html https://access.redhat.com/security/cve/CVE-2020-12243 https://bugs.openldap.org/show_bug.cgi?id=9202 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243 https://git.openldap.org/openldap/openldap/-/blob/OPENLDAP_REL_ENG_2_4/CHANGES https://git.openldap.org/openldap/openldap/-/commit/98464c11df8247d6a11b52e294ba5dd4f0380440 https://linux.oracle.com/cve/CVE-2020-12243.html https://linux.oracle.com/errata/ELSA-2020-4041.html https://lists.debian.org/debian-lts-announce/2020/05/msg00001.html https://lists.openldap.org/hyperkitty/list/openldap-announce@openldap.org/thread/FUOYA6YCHBXMLANBJMSO22JD2NB22WGC/ https://security.netapp.com/advisory/ntap-20200511-0003/ https://support.apple.com/kb/HT211289 https://ubuntu.com/security/notices/USN-4352-1 https://ubuntu.com/security/notices/USN-4352-2 https://usn.ubuntu.com/4352-1/ https://usn.ubuntu.com/4352-2/ https://www.debian.org/security/2020/dsa-4666 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
| openldap | CVE-2020-25692 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-23.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-25692 https://bugzilla.redhat.com/show_bug.cgi?id=1894567 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692 https://linux.oracle.com/cve/CVE-2020-25692.html https://linux.oracle.com/errata/ELSA-2021-1389.html https://nvd.nist.gov/vuln/detail/CVE-2020-25692 https://security.netapp.com/advisory/ntap-20210108-0006/ https://ubuntu.com/security/notices/USN-4622-1 https://ubuntu.com/security/notices/USN-4622-2
|
| openldap | CVE-2020-25709 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-25.el7_9 | Expand...http://seclists.org/fulldisclosure/2021/Feb/14 https://access.redhat.com/security/cve/CVE-2020-25709 https://bugzilla.redhat.com/show_bug.cgi?id=1899675 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709 https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c https://linux.oracle.com/cve/CVE-2020-25709.html https://linux.oracle.com/errata/ELSA-2022-0621.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html https://security.netapp.com/advisory/ntap-20210716-0003/ https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-4634-1 https://ubuntu.com/security/notices/USN-4634-2 https://www.debian.org/security/2020/dsa-4792
|
| openldap | CVE-2020-25710 | MEDIUM | 2.4.44-21.el7_6 | 2.4.44-25.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2020-25710 https://bugzilla.redhat.com/show_bug.cgi?id=1899678 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710 https://git.openldap.org/openldap/openldap/-/commit/ab3915154e69920d480205b4bf5ccb2b391a0a1f#a2feb6ed0257c21c6672793ee2f94eaadc10c72c https://linux.oracle.com/cve/CVE-2020-25710.html https://linux.oracle.com/errata/ELSA-2022-0621.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/12/msg00008.html https://security.netapp.com/advisory/ntap-20210716-0003/ https://ubuntu.com/security/notices/USN-4634-1 https://ubuntu.com/security/notices/USN-4634-2 https://www.debian.org/security/2020/dsa-4792
|
| openldap | CVE-2020-36221 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36221 https://bugs.openldap.org/show_bug.cgi?id=9404 https://bugs.openldap.org/show_bug.cgi?id=9424 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36221 https://git.openldap.org/openldap/openldap/-/commit/38ac838e4150c626bbfa0082b7e2cf3a2bb4df31 https://git.openldap.org/openldap/openldap/-/commit/58c1748e81c843c5b6e61648d2a4d1d82b47e842 https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36221 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36222 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36222 https://bugs.openldap.org/show_bug.cgi?id=9406 https://bugs.openldap.org/show_bug.cgi?id=9407 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36222 https://git.openldap.org/openldap/openldap/-/commit/02dfc32d658fadc25e4040f78e36592f6e1e1ca0 https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed https://git.openldap.org/openldap/openldap/-/commit/6ed057b5b728b50746c869bcc9c1f85d0bbbf6ed.aa https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36222 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36223 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36223 https://bugs.openldap.org/show_bug.cgi?id=9408 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36223 https://git.openldap.org/openldap/openldap/-/commit/21981053a1195ae1555e23df4d9ac68d34ede9dd https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36223 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36224 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36224 https://bugs.openldap.org/show_bug.cgi?id=9409 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36224 https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36224 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36225 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36225 https://bugs.openldap.org/show_bug.cgi?id=9412 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36225 https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36225 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36226 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36226 https://bugs.openldap.org/show_bug.cgi?id=9413 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36226 https://git.openldap.org/openldap/openldap/-/commit/554dff1927176579d652f2fe60c90e9abbad4c65 https://git.openldap.org/openldap/openldap/-/commit/5a2017d4e61a6ddc4dcb4415028e0d08eb6bca26 https://git.openldap.org/openldap/openldap/-/commit/c0b61a9486508e5202aa2e0cfb68c9813731b439 https://git.openldap.org/openldap/openldap/-/commit/d169e7958a3e0dc70f59c8374bf8a59833b7bdd8 https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36226 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36227 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36227 https://bugs.openldap.org/show_bug.cgi?id=9428 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36227 https://git.openldap.org/openldap/openldap/-/commit/9d0e8485f3113505743baabf1167e01e4558ccf5 https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36227 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36228 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36228 https://bugs.openldap.org/show_bug.cgi?id=9427 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36228 https://git.openldap.org/openldap/openldap/-/commit/91dccd25c347733b365adc74cb07d074512ed5ad https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36228 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36229 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36229 https://bugs.openldap.org/show_bug.cgi?id=9425 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36229 https://git.openldap.org/openldap/openldap/-/commit/4bdfffd2889c0c5cdf58bebafbdc8fce4bb2bff0 https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36229 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2020-36230 | MEDIUM | 2.4.44-21.el7_6 | | Expand...http://seclists.org/fulldisclosure/2021/May/64 http://seclists.org/fulldisclosure/2021/May/65 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2020-36230 https://bugs.openldap.org/show_bug.cgi?id=9423 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36230 https://git.openldap.org/openldap/openldap/-/commit/8c1d96ee36ed98b32cd0e28b7069c7b8ea09d793 https://git.openldap.org/openldap/openldap/-/tags/OPENLDAP_REL_ENG_2_4_57 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00005.html https://nvd.nist.gov/vuln/detail/CVE-2020-36230 https://security.netapp.com/advisory/ntap-20210226-0002/ https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212530 https://support.apple.com/kb/HT212531 https://ubuntu.com/security/notices/USN-4724-1 https://www.debian.org/security/2021/dsa-4845
|
| openldap | CVE-2021-27212 | MEDIUM | 2.4.44-21.el7_6 | | Expand...https://access.redhat.com/security/cve/CVE-2021-27212 https://bugs.openldap.org/show_bug.cgi?id=9454 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27212 https://git.openldap.org/openldap/openldap/-/commit/3539fc33212b528c56b716584f2c2994af7c30b0 https://git.openldap.org/openldap/openldap/-/commit/9badb73425a67768c09bcaed1a9c26c684af6c30 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00035.html https://nvd.nist.gov/vuln/detail/CVE-2021-27212 https://security.netapp.com/advisory/ntap-20210319-0005/ https://ubuntu.com/security/notices/USN-4744-1 https://www.debian.org/security/2021/dsa-4860
|
| openldap | CVE-2022-29155 | MEDIUM | 2.4.44-21.el7_6 | | Expand...https://access.redhat.com/security/cve/CVE-2022-29155 https://bugs.openldap.org/show_bug.cgi?id=9815 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29155 https://lists.debian.org/debian-lts-announce/2022/05/msg00032.html https://nvd.nist.gov/vuln/detail/CVE-2022-29155 https://security.netapp.com/advisory/ntap-20220609-0007/ https://ubuntu.com/security/notices/USN-5424-1 https://ubuntu.com/security/notices/USN-5424-2 https://www.debian.org/security/2022/dsa-5140
|
| openldap | CVE-2016-4984 | LOW | 2.4.44-21.el7_6 | | Expand...https://access.redhat.com/security/cve/CVE-2016-4984 https://bugzilla.redhat.com/show_bug.cgi?id=1346120
|
| openldap | CVE-2020-15719 | LOW | 2.4.44-21.el7_6 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00033.html http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00059.html https://access.redhat.com/errata/RHBA-2019:3674 https://access.redhat.com/security/cve/CVE-2020-15719 https://bugs.openldap.org/show_bug.cgi?id=9266 https://bugzilla.redhat.com/show_bug.cgi?id=1740070 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openssh | CVE-2018-20685 | MEDIUM | 7.4p1-21.el7 | | Expand...http://www.securityfocus.com/bid/106531 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2018-20685 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685 https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2 https://linux.oracle.com/cve/CVE-2018-20685.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.gentoo.org/glsa/202007-53 https://security.netapp.com/advisory/ntap-20190215-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh | CVE-2019-6111 | MEDIUM | 7.4p1-21.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html http://www.openwall.com/lists/oss-security/2019/04/18/1 http://www.securityfocus.com/bid/106741 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6111 https://bugzilla.redhat.com/show_bug.cgi?id=1677794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111 https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6111.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://ubuntu.com/security/notices/USN-3885-2 https://usn.ubuntu.com/3885-1/ https://usn.ubuntu.com/3885-2/ https://www.debian.org/security/2019/dsa-4387 https://www.exploit-db.com/exploits/46193/ https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh | CVE-2020-14145 | MEDIUM | 7.4p1-21.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
| openssh | CVE-2020-15778 | MEDIUM | 7.4p1-21.el7 | | Expand...https://access.redhat.com/articles/5284081 https://access.redhat.com/security/cve/CVE-2020-15778 https://github.com/cpandya2909/CVE-2020-15778 https://github.com/cpandya2909/CVE-2020-15778/ https://news.ycombinator.com/item?id=25005567 https://nvd.nist.gov/vuln/detail/CVE-2020-15778 https://security.netapp.com/advisory/ntap-20200731-0007/ https://www.openssh.com/security.html
|
| openssh | CVE-2021-41617 | MEDIUM | 7.4p1-21.el7 | 7.4p1-22.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://errata.almalinux.org/8/ALSA-2022-2013.html https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2022-2013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openssh | CVE-2016-20012 | LOW | 7.4p1-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2016-20012 https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265 https://github.com/openssh/openssh-portable/pull/270 https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097 https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185 https://nvd.nist.gov/vuln/detail/CVE-2016-20012 https://rushter.com/blog/public-ssh-keys/ https://security.netapp.com/advisory/ntap-20211014-0005/ https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak https://www.openwall.com/lists/oss-security/2018/08/24/1
|
| openssh | CVE-2018-15919 | LOW | 7.4p1-21.el7 | | Expand...http://seclists.org/oss-sec/2018/q3/180 http://www.securityfocus.com/bid/105163 https://access.redhat.com/security/cve/CVE-2018-15919 https://security.netapp.com/advisory/ntap-20181221-0001/
|
| openssh | CVE-2019-6109 | LOW | 7.4p1-21.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6109 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109 https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6109.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh | CVE-2019-6110 | LOW | 7.4p1-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-6110 https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://www.exploit-db.com/exploits/46193/
|
| openssh-clients | CVE-2018-20685 | MEDIUM | 7.4p1-21.el7 | | Expand...http://www.securityfocus.com/bid/106531 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2018-20685 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685 https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2 https://linux.oracle.com/cve/CVE-2018-20685.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.gentoo.org/glsa/202007-53 https://security.netapp.com/advisory/ntap-20190215-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh-clients | CVE-2019-6111 | MEDIUM | 7.4p1-21.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html http://www.openwall.com/lists/oss-security/2019/04/18/1 http://www.securityfocus.com/bid/106741 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6111 https://bugzilla.redhat.com/show_bug.cgi?id=1677794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111 https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6111.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://ubuntu.com/security/notices/USN-3885-2 https://usn.ubuntu.com/3885-1/ https://usn.ubuntu.com/3885-2/ https://www.debian.org/security/2019/dsa-4387 https://www.exploit-db.com/exploits/46193/ https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh-clients | CVE-2020-14145 | MEDIUM | 7.4p1-21.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
| openssh-clients | CVE-2020-15778 | MEDIUM | 7.4p1-21.el7 | | Expand...https://access.redhat.com/articles/5284081 https://access.redhat.com/security/cve/CVE-2020-15778 https://github.com/cpandya2909/CVE-2020-15778 https://github.com/cpandya2909/CVE-2020-15778/ https://news.ycombinator.com/item?id=25005567 https://nvd.nist.gov/vuln/detail/CVE-2020-15778 https://security.netapp.com/advisory/ntap-20200731-0007/ https://www.openssh.com/security.html
|
| openssh-clients | CVE-2021-41617 | MEDIUM | 7.4p1-21.el7 | 7.4p1-22.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://errata.almalinux.org/8/ALSA-2022-2013.html https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2022-2013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openssh-clients | CVE-2016-20012 | LOW | 7.4p1-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2016-20012 https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265 https://github.com/openssh/openssh-portable/pull/270 https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097 https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185 https://nvd.nist.gov/vuln/detail/CVE-2016-20012 https://rushter.com/blog/public-ssh-keys/ https://security.netapp.com/advisory/ntap-20211014-0005/ https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak https://www.openwall.com/lists/oss-security/2018/08/24/1
|
| openssh-clients | CVE-2018-15919 | LOW | 7.4p1-21.el7 | | Expand...http://seclists.org/oss-sec/2018/q3/180 http://www.securityfocus.com/bid/105163 https://access.redhat.com/security/cve/CVE-2018-15919 https://security.netapp.com/advisory/ntap-20181221-0001/
|
| openssh-clients | CVE-2019-6109 | LOW | 7.4p1-21.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6109 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109 https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6109.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh-clients | CVE-2019-6110 | LOW | 7.4p1-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-6110 https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://www.exploit-db.com/exploits/46193/
|
| openssh-server | CVE-2018-20685 | MEDIUM | 7.4p1-21.el7 | | Expand...http://www.securityfocus.com/bid/106531 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2018-20685 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20685 https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2 https://linux.oracle.com/cve/CVE-2018-20685.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.gentoo.org/glsa/202007-53 https://security.netapp.com/advisory/ntap-20190215-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh-server | CVE-2019-6111 | MEDIUM | 7.4p1-21.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html http://www.openwall.com/lists/oss-security/2019/04/18/1 http://www.securityfocus.com/bid/106741 https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6111 https://bugzilla.redhat.com/show_bug.cgi?id=1677794 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6111 https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6111.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://ubuntu.com/security/notices/USN-3885-2 https://usn.ubuntu.com/3885-1/ https://usn.ubuntu.com/3885-2/ https://www.debian.org/security/2019/dsa-4387 https://www.exploit-db.com/exploits/46193/ https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh-server | CVE-2020-14145 | MEDIUM | 7.4p1-21.el7 | | Expand...http://www.openwall.com/lists/oss-security/2020/12/02/1 https://access.redhat.com/security/cve/CVE-2020-14145 https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14145 https://docs.ssh-mitm.at/CVE-2020-14145.html https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1 https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py https://linux.oracle.com/cve/CVE-2020-14145.html https://linux.oracle.com/errata/ELSA-2021-4368.html https://nvd.nist.gov/vuln/detail/CVE-2020-14145 https://security.gentoo.org/glsa/202105-35 https://security.netapp.com/advisory/ntap-20200709-0004/ https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/ https://www.fzi.de/fileadmin/user_upload/2020-06-26-FSA-2020-2.pdf
|
| openssh-server | CVE-2020-15778 | MEDIUM | 7.4p1-21.el7 | | Expand...https://access.redhat.com/articles/5284081 https://access.redhat.com/security/cve/CVE-2020-15778 https://github.com/cpandya2909/CVE-2020-15778 https://github.com/cpandya2909/CVE-2020-15778/ https://news.ycombinator.com/item?id=25005567 https://nvd.nist.gov/vuln/detail/CVE-2020-15778 https://security.netapp.com/advisory/ntap-20200731-0007/ https://www.openssh.com/security.html
|
| openssh-server | CVE-2021-41617 | MEDIUM | 7.4p1-21.el7 | 7.4p1-22.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41617.json https://access.redhat.com/security/cve/CVE-2021-41617 https://bugzilla.suse.com/show_bug.cgi?id=1190975 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617 https://errata.almalinux.org/8/ALSA-2022-2013.html https://linux.oracle.com/cve/CVE-2021-41617.html https://linux.oracle.com/errata/ELSA-2022-2013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/ https://nvd.nist.gov/vuln/detail/CVE-2021-41617 https://security.netapp.com/advisory/ntap-20211014-0004/ https://www.openssh.com/security.html https://www.openssh.com/txt/release-8.8 https://www.openwall.com/lists/oss-security/2021/09/26/1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| openssh-server | CVE-2016-20012 | LOW | 7.4p1-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2016-20012 https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265 https://github.com/openssh/openssh-portable/pull/270 https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097 https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185 https://nvd.nist.gov/vuln/detail/CVE-2016-20012 https://rushter.com/blog/public-ssh-keys/ https://security.netapp.com/advisory/ntap-20211014-0005/ https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak https://www.openwall.com/lists/oss-security/2018/08/24/1
|
| openssh-server | CVE-2018-15919 | LOW | 7.4p1-21.el7 | | Expand...http://seclists.org/oss-sec/2018/q3/180 http://www.securityfocus.com/bid/105163 https://access.redhat.com/security/cve/CVE-2018-15919 https://security.netapp.com/advisory/ntap-20181221-0001/
|
| openssh-server | CVE-2019-6109 | LOW | 7.4p1-21.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html https://access.redhat.com/errata/RHSA-2019:3702 https://access.redhat.com/security/cve/CVE-2019-6109 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6109 https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://linux.oracle.com/cve/CVE-2019-6109.html https://linux.oracle.com/errata/ELSA-2019-3702.html https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/ https://lists.mindrot.org/pipermail/openssh-unix-dev/2019-January/037459.html https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://ubuntu.com/security/notices/USN-3885-1 https://usn.ubuntu.com/3885-1/ https://www.debian.org/security/2019/dsa-4387 https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
| openssh-server | CVE-2019-6110 | LOW | 7.4p1-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-6110 https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c https://security.gentoo.org/glsa/201903-16 https://security.netapp.com/advisory/ntap-20190213-0001/ https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt https://www.exploit-db.com/exploits/46193/
|
| openssl-devel | CVE-2020-1971 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-21.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2021/09/14/2 https://access.redhat.com/security/cve/CVE-2020-1971 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676 https://linux.oracle.com/cve/CVE-2020-1971.html https://linux.oracle.com/errata/ELSA-2021-9150.html https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/ https://nvd.nist.gov/vuln/detail/CVE-2020-1971 https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc https://security.gentoo.org/glsa/202012-13 https://security.netapp.com/advisory/ntap-20201218-0005/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://ubuntu.com/security/notices/USN-4662-1 https://ubuntu.com/security/notices/USN-4745-1 https://www.debian.org/security/2020/dsa-4807 https://www.openssl.org/news/secadv/20201208.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2020-11 https://www.tenable.com/security/tns-2021-09 https://www.tenable.com/security/tns-2021-10
|
| openssl-devel | CVE-2022-0778 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-25.el7_9 | Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json https://access.redhat.com/security/cve/CVE-2022-0778 https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://errata.almalinux.org/8/ALSA-2022-1065.html https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9272.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://security.netapp.com/advisory/ntap-20220429-0005/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-06 https://www.tenable.com/security/tns-2022-07 https://www.tenable.com/security/tns-2022-08 https://www.tenable.com/security/tns-2022-09
|
| openssl-devel | CVE-2015-2808 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html http://marc.info/?l=bugtraq&m=143456209711959&w=2 http://marc.info/?l=bugtraq&m=143629696317098&w=2 http://marc.info/?l=bugtraq&m=143741441012338&w=2 http://marc.info/?l=bugtraq&m=143817021313142&w=2 http://marc.info/?l=bugtraq&m=143817899717054&w=2 http://marc.info/?l=bugtraq&m=143818140118771&w=2 http://marc.info/?l=bugtraq&m=144043644216842&w=2 http://marc.info/?l=bugtraq&m=144059660127919&w=2 http://marc.info/?l=bugtraq&m=144059703728085&w=2 http://marc.info/?l=bugtraq&m=144060576831314&w=2 http://marc.info/?l=bugtraq&m=144060606031437&w=2 http://marc.info/?l=bugtraq&m=144069189622016&w=2 http://marc.info/?l=bugtraq&m=144102017024820&w=2 http://marc.info/?l=bugtraq&m=144104533800819&w=2 http://marc.info/?l=bugtraq&m=144104565600964&w=2 http://marc.info/?l=bugtraq&m=144493176821532&w=2 http://rhn.redhat.com/errata/RHSA-2015-1006.html http://rhn.redhat.com/errata/RHSA-2015-1007.html http://rhn.redhat.com/errata/RHSA-2015-1020.html http://rhn.redhat.com/errata/RHSA-2015-1021.html http://rhn.redhat.com/errata/RHSA-2015-1091.html http://rhn.redhat.com/errata/RHSA-2015-1228.html http://rhn.redhat.com/errata/RHSA-2015-1229.html http://rhn.redhat.com/errata/RHSA-2015-1230.html http://rhn.redhat.com/errata/RHSA-2015-1241.html http://rhn.redhat.com/errata/RHSA-2015-1242.html http://rhn.redhat.com/errata/RHSA-2015-1243.html http://rhn.redhat.com/errata/RHSA-2015-1526.html http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888 http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892 http://www-01.ibm.com/support/docview.wss?uid=swg21883640 http://www-304.ibm.com/support/docview.wss?uid=swg21903565 http://www-304.ibm.com/support/docview.wss?uid=swg21960015 http://www-304.ibm.com/support/docview.wss?uid=swg21960769 http://www.debian.org/security/2015/dsa-3316 http://www.debian.org/security/2015/dsa-3339 http://www.huawei.com/en/psirt/security-advisories/hw-454055 http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.securityfocus.com/bid/73684 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1032599 http://www.securitytracker.com/id/1032600 http://www.securitytracker.com/id/1032707 http://www.securitytracker.com/id/1032708 http://www.securitytracker.com/id/1032734 http://www.securitytracker.com/id/1032788 http://www.securitytracker.com/id/1032858 http://www.securitytracker.com/id/1032868 http://www.securitytracker.com/id/1032910 http://www.securitytracker.com/id/1032990 http://www.securitytracker.com/id/1033071 http://www.securitytracker.com/id/1033072 http://www.securitytracker.com/id/1033386 http://www.securitytracker.com/id/1033415 http://www.securitytracker.com/id/1033431 http://www.securitytracker.com/id/1033432 http://www.securitytracker.com/id/1033737 http://www.securitytracker.com/id/1033769 http://www.securitytracker.com/id/1036222 http://www.ubuntu.com/usn/USN-2696-1 http://www.ubuntu.com/usn/USN-2706-1 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm https://access.redhat.com/security/cve/CVE-2015-2808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888 https://kb.juniper.net/JSA10783 https://kc.mcafee.com/corporate/index?page=content&id=SB10163 https://linux.oracle.com/cve/CVE-2015-2808.html https://linux.oracle.com/errata/ELSA-2015-1526.html https://security.gentoo.org/glsa/201512-10 https://ubuntu.com/security/notices/USN-2696-1 https://ubuntu.com/security/notices/USN-2706-1 https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709 https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
|
| openssl-devel | CVE-2019-1547 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html https://access.redhat.com/security/cve/CVE-2019-1547 https://arxiv.org/abs/1909.01785 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2019-1547.html https://linux.oracle.com/errata/ELSA-2020-1840.html https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/ https://seclists.org/bugtraq/2019/Oct/0 https://seclists.org/bugtraq/2019/Oct/1 https://seclists.org/bugtraq/2019/Sep/25 https://security.gentoo.org/glsa/201911-04 https://security.netapp.com/advisory/ntap-20190919-0002/ https://security.netapp.com/advisory/ntap-20200122-0002/ https://security.netapp.com/advisory/ntap-20200416-0003/ https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4376-1 https://ubuntu.com/security/notices/USN-4376-2 https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4376-1/ https://usn.ubuntu.com/4376-2/ https://usn.ubuntu.com/4504-1/ https://www.debian.org/security/2019/dsa-4539 https://www.debian.org/security/2019/dsa-4540 https://www.openssl.org/news/secadv/20190910.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.tenable.com/security/tns-2019-08 https://www.tenable.com/security/tns-2019-09
|
| openssl-devel | CVE-2021-23840 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2021-23840 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-23840.html https://linux.oracle.com/errata/ELSA-2021-9561.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://rustsec.org/advisories/RUSTSEC-2021-0057.html https://security.gentoo.org/glsa/202103-03 https://security.netapp.com/advisory/ntap-20210219-0009/ https://ubuntu.com/security/notices/USN-4738-1 https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4855 https://www.openssl.org/news/secadv/20210216.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-03 https://www.tenable.com/security/tns-2021-09 https://www.tenable.com/security/tns-2021-10
|
| openssl-devel | CVE-2021-23841 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 | Expand...http://seclists.org/fulldisclosure/2021/May/67 http://seclists.org/fulldisclosure/2021/May/68 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2021-23841 https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 https://linux.oracle.com/cve/CVE-2021-23841.html https://linux.oracle.com/errata/ELSA-2021-9561.html https://rustsec.org/advisories/RUSTSEC-2021-0058.html https://security.gentoo.org/glsa/202103-03 https://security.netapp.com/advisory/ntap-20210219-0009/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://support.apple.com/kb/HT212528 https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212534 https://ubuntu.com/security/notices/USN-4738-1 https://ubuntu.com/security/notices/USN-4745-1 https://www.debian.org/security/2021/dsa-4855 https://www.openssl.org/news/secadv/20210216.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-03 https://www.tenable.com/security/tns-2021-09
|
| openssl-devel | CVE-2021-3712 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-23.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json https://access.redhat.com/security/cve/CVE-2021-3712 https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-3712.html https://linux.oracle.com/errata/ELSA-2022-9023.html https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html https://nvd.nist.gov/vuln/detail/CVE-2021-3712 https://rustsec.org/advisories/RUSTSEC-2021-0098.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://ubuntu.com/security/notices/USN-5051-1 https://ubuntu.com/security/notices/USN-5051-2 https://ubuntu.com/security/notices/USN-5051-3 https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm) https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
| openssl-devel | CVE-2022-1292 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1292 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23 https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/ https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html https://nvd.nist.gov/vuln/detail/CVE-2022-1292 https://security.netapp.com/advisory/ntap-20220602-0009/ https://ubuntu.com/security/notices/USN-5402-1 https://ubuntu.com/security/notices/USN-5402-2 https://www.debian.org/security/2022/dsa-5139 https://www.openssl.org/news/secadv/20220503.txt
|
| openssl-devel | CVE-2022-2068 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-2068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7 https://ubuntu.com/security/notices/USN-5488-1 https://www.openssl.org/news/secadv/20220621.txt
|
| openssl-devel | CVE-2019-1551 | LOW | 1:1.0.2k-19.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html https://access.redhat.com/security/cve/CVE-2019-1551 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98 https://github.com/openssl/openssl/pull/10575 https://linux.oracle.com/cve/CVE-2019-1551.html https://linux.oracle.com/errata/ELSA-2020-4514.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/ https://seclists.org/bugtraq/2019/Dec/39 https://seclists.org/bugtraq/2019/Dec/46 https://security.gentoo.org/glsa/202004-10 https://security.netapp.com/advisory/ntap-20191210-0001/ https://ubuntu.com/security/notices/USN-4376-1 https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4376-1/ https://usn.ubuntu.com/4504-1/ https://www.debian.org/security/2019/dsa-4594 https://www.debian.org/security/2021/dsa-4855 https://www.openssl.org/news/secadv/20191206.txt https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.tenable.com/security/tns-2019-09 https://www.tenable.com/security/tns-2020-03 https://www.tenable.com/security/tns-2020-11 https://www.tenable.com/security/tns-2021-10
|
| openssl-devel | CVE-2019-1563 | LOW | 1:1.0.2k-19.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html https://access.redhat.com/security/cve/CVE-2019-1563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2019-1563.html https://linux.oracle.com/errata/ELSA-2020-1840.html https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/ https://seclists.org/bugtraq/2019/Oct/0 https://seclists.org/bugtraq/2019/Oct/1 https://seclists.org/bugtraq/2019/Sep/25 https://security.gentoo.org/glsa/201911-04 https://security.netapp.com/advisory/ntap-20190919-0002/ https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4376-1 https://ubuntu.com/security/notices/USN-4376-2 https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4376-1/ https://usn.ubuntu.com/4376-2/ https://usn.ubuntu.com/4504-1/ https://www.debian.org/security/2019/dsa-4539 https://www.debian.org/security/2019/dsa-4540 https://www.openssl.org/news/secadv/20190910.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.tenable.com/security/tns-2019-09
|
| openssl-devel | CVE-2020-1968 | LOW | 1:1.0.2k-19.el7 | | Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al. Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf https://access.redhat.com/security/cve/CVE-2020-1968 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968 https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html https://security.netapp.com/advisory/ntap-20200911-0004/ https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4504-1/ https://www.openssl.org/news/secadv/20200909.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| openssl-devel | CVE-2021-3601 | LOW | 1:1.0.2k-19.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3601 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601
|
| openssl-libs | CVE-2020-1971 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-21.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2021/09/14/2 https://access.redhat.com/security/cve/CVE-2020-1971 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f960d81215ebf3f65e03d4d5d857fb9b666d6920 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44676 https://linux.oracle.com/cve/CVE-2020-1971.html https://linux.oracle.com/errata/ELSA-2021-9150.html https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143@%3Ccommits.pulsar.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/12/msg00020.html https://lists.debian.org/debian-lts-announce/2020/12/msg00021.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/ https://nvd.nist.gov/vuln/detail/CVE-2020-1971 https://security.FreeBSD.org/advisories/FreeBSD-SA-20:33.openssl.asc https://security.gentoo.org/glsa/202012-13 https://security.netapp.com/advisory/ntap-20201218-0005/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://ubuntu.com/security/notices/USN-4662-1 https://ubuntu.com/security/notices/USN-4745-1 https://www.debian.org/security/2020/dsa-4807 https://www.openssl.org/news/secadv/20201208.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2020-11 https://www.tenable.com/security/tns-2021-09 https://www.tenable.com/security/tns-2021-10
|
| openssl-libs | CVE-2022-0778 | HIGH | 1:1.0.2k-19.el7 | 1:1.0.2k-25.el7_9 | Expand...http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json https://access.redhat.com/security/cve/CVE-2022-0778 https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778 https://errata.almalinux.org/8/ALSA-2022-1065.html https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246 https://linux.oracle.com/cve/CVE-2022-0778.html https://linux.oracle.com/errata/ELSA-2022-9272.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/ https://nvd.nist.gov/vuln/detail/CVE-2022-0778 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002 https://rustsec.org/advisories/RUSTSEC-2022-0014.html https://security.netapp.com/advisory/ntap-20220321-0002/ https://security.netapp.com/advisory/ntap-20220429-0005/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5328-1 https://ubuntu.com/security/notices/USN-5328-2 https://www.debian.org/security/2022/dsa-5103 https://www.openssl.org/news/secadv/20220315.txt https://www.oracle.com/security-alerts/cpuapr2022.html https://www.tenable.com/security/tns-2022-06 https://www.tenable.com/security/tns-2022-07 https://www.tenable.com/security/tns-2022-08 https://www.tenable.com/security/tns-2022-09
|
| openssl-libs | CVE-2015-2808 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10727 http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00022.html http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00031.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00039.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00040.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00046.html http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00047.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00005.html http://marc.info/?l=bugtraq&m=143456209711959&w=2 http://marc.info/?l=bugtraq&m=143629696317098&w=2 http://marc.info/?l=bugtraq&m=143741441012338&w=2 http://marc.info/?l=bugtraq&m=143817021313142&w=2 http://marc.info/?l=bugtraq&m=143817899717054&w=2 http://marc.info/?l=bugtraq&m=143818140118771&w=2 http://marc.info/?l=bugtraq&m=144043644216842&w=2 http://marc.info/?l=bugtraq&m=144059660127919&w=2 http://marc.info/?l=bugtraq&m=144059703728085&w=2 http://marc.info/?l=bugtraq&m=144060576831314&w=2 http://marc.info/?l=bugtraq&m=144060606031437&w=2 http://marc.info/?l=bugtraq&m=144069189622016&w=2 http://marc.info/?l=bugtraq&m=144102017024820&w=2 http://marc.info/?l=bugtraq&m=144104533800819&w=2 http://marc.info/?l=bugtraq&m=144104565600964&w=2 http://marc.info/?l=bugtraq&m=144493176821532&w=2 http://rhn.redhat.com/errata/RHSA-2015-1006.html http://rhn.redhat.com/errata/RHSA-2015-1007.html http://rhn.redhat.com/errata/RHSA-2015-1020.html http://rhn.redhat.com/errata/RHSA-2015-1021.html http://rhn.redhat.com/errata/RHSA-2015-1091.html http://rhn.redhat.com/errata/RHSA-2015-1228.html http://rhn.redhat.com/errata/RHSA-2015-1229.html http://rhn.redhat.com/errata/RHSA-2015-1230.html http://rhn.redhat.com/errata/RHSA-2015-1241.html http://rhn.redhat.com/errata/RHSA-2015-1242.html http://rhn.redhat.com/errata/RHSA-2015-1243.html http://rhn.redhat.com/errata/RHSA-2015-1526.html http://www-01.ibm.com/support/docview.wss?uid=swg1IV71888 http://www-01.ibm.com/support/docview.wss?uid=swg1IV71892 http://www-01.ibm.com/support/docview.wss?uid=swg21883640 http://www-304.ibm.com/support/docview.wss?uid=swg21903565 http://www-304.ibm.com/support/docview.wss?uid=swg21960015 http://www-304.ibm.com/support/docview.wss?uid=swg21960769 http://www.debian.org/security/2015/dsa-3316 http://www.debian.org/security/2015/dsa-3339 http://www.huawei.com/en/psirt/security-advisories/hw-454055 http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html http://www.securityfocus.com/bid/73684 http://www.securityfocus.com/bid/91787 http://www.securitytracker.com/id/1032599 http://www.securitytracker.com/id/1032600 http://www.securitytracker.com/id/1032707 http://www.securitytracker.com/id/1032708 http://www.securitytracker.com/id/1032734 http://www.securitytracker.com/id/1032788 http://www.securitytracker.com/id/1032858 http://www.securitytracker.com/id/1032868 http://www.securitytracker.com/id/1032910 http://www.securitytracker.com/id/1032990 http://www.securitytracker.com/id/1033071 http://www.securitytracker.com/id/1033072 http://www.securitytracker.com/id/1033386 http://www.securitytracker.com/id/1033415 http://www.securitytracker.com/id/1033431 http://www.securitytracker.com/id/1033432 http://www.securitytracker.com/id/1033737 http://www.securitytracker.com/id/1033769 http://www.securitytracker.com/id/1036222 http://www.ubuntu.com/usn/USN-2696-1 http://www.ubuntu.com/usn/USN-2706-1 http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-454055.htm https://access.redhat.com/security/cve/CVE-2015-2808 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808 https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04687922 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04770140 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04772190 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773119 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773241 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04773256 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04708650 https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04711380 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05085988 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05193347 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05289935 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05336888 https://kb.juniper.net/JSA10783 https://kc.mcafee.com/corporate/index?page=content&id=SB10163 https://linux.oracle.com/cve/CVE-2015-2808.html https://linux.oracle.com/errata/ELSA-2015-1526.html https://security.gentoo.org/glsa/201512-10 https://ubuntu.com/security/notices/USN-2696-1 https://ubuntu.com/security/notices/USN-2706-1 https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5098709 https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
|
| openssl-libs | CVE-2019-1547 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html https://access.redhat.com/security/cve/CVE-2019-1547 https://arxiv.org/abs/1909.01785 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=21c856b75d81eff61aa63b4f036bb64a85bf6d46 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=30c22fa8b1d840036b8e203585738df62a03cec8 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2019-1547.html https://linux.oracle.com/errata/ELSA-2020-1840.html https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/ https://seclists.org/bugtraq/2019/Oct/0 https://seclists.org/bugtraq/2019/Oct/1 https://seclists.org/bugtraq/2019/Sep/25 https://security.gentoo.org/glsa/201911-04 https://security.netapp.com/advisory/ntap-20190919-0002/ https://security.netapp.com/advisory/ntap-20200122-0002/ https://security.netapp.com/advisory/ntap-20200416-0003/ https://support.f5.com/csp/article/K73422160?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4376-1 https://ubuntu.com/security/notices/USN-4376-2 https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4376-1/ https://usn.ubuntu.com/4376-2/ https://usn.ubuntu.com/4504-1/ https://www.debian.org/security/2019/dsa-4539 https://www.debian.org/security/2019/dsa-4540 https://www.openssl.org/news/secadv/20190910.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.tenable.com/security/tns-2019-08 https://www.tenable.com/security/tns-2019-09
|
| openssl-libs | CVE-2021-23840 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2021-23840 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-23840.html https://linux.oracle.com/errata/ELSA-2021-9561.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://rustsec.org/advisories/RUSTSEC-2021-0057.html https://security.gentoo.org/glsa/202103-03 https://security.netapp.com/advisory/ntap-20210219-0009/ https://ubuntu.com/security/notices/USN-4738-1 https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4855 https://www.openssl.org/news/secadv/20210216.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-03 https://www.tenable.com/security/tns-2021-09 https://www.tenable.com/security/tns-2021-10
|
| openssl-libs | CVE-2021-23841 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-22.el7_9 | Expand...http://seclists.org/fulldisclosure/2021/May/67 http://seclists.org/fulldisclosure/2021/May/68 http://seclists.org/fulldisclosure/2021/May/70 https://access.redhat.com/security/cve/CVE-2021-23841 https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807 https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846 https://linux.oracle.com/cve/CVE-2021-23841.html https://linux.oracle.com/errata/ELSA-2021-9561.html https://rustsec.org/advisories/RUSTSEC-2021-0058.html https://security.gentoo.org/glsa/202103-03 https://security.netapp.com/advisory/ntap-20210219-0009/ https://security.netapp.com/advisory/ntap-20210513-0002/ https://support.apple.com/kb/HT212528 https://support.apple.com/kb/HT212529 https://support.apple.com/kb/HT212534 https://ubuntu.com/security/notices/USN-4738-1 https://ubuntu.com/security/notices/USN-4745-1 https://www.debian.org/security/2021/dsa-4855 https://www.openssl.org/news/secadv/20210216.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-03 https://www.tenable.com/security/tns-2021-09
|
| openssl-libs | CVE-2021-3712 | MEDIUM | 1:1.0.2k-19.el7 | 1:1.0.2k-23.el7_9 | Expand...http://www.openwall.com/lists/oss-security/2021/08/26/2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json https://access.redhat.com/security/cve/CVE-2021-3712 https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://crates.io/crates/openssl-src https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12 https://kc.mcafee.com/corporate/index?page=content&id=SB10366 https://linux.oracle.com/cve/CVE-2021-3712.html https://linux.oracle.com/errata/ELSA-2022-9023.html https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html https://nvd.nist.gov/vuln/detail/CVE-2021-3712 https://rustsec.org/advisories/RUSTSEC-2021-0098.html https://security.netapp.com/advisory/ntap-20210827-0010/ https://ubuntu.com/security/notices/USN-5051-1 https://ubuntu.com/security/notices/USN-5051-2 https://ubuntu.com/security/notices/USN-5051-3 https://ubuntu.com/security/notices/USN-5051-4 (regression only in trusty/esm) https://ubuntu.com/security/notices/USN-5088-1 https://www.debian.org/security/2021/dsa-4963 https://www.openssl.org/news/secadv/20210824.txt https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html https://www.tenable.com/security/tns-2021-16 https://www.tenable.com/security/tns-2022-02
|
| openssl-libs | CVE-2022-1292 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1292 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23 https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/ https://mta.openssl.org/pipermail/openssl-announce/2022-May/000224.html https://nvd.nist.gov/vuln/detail/CVE-2022-1292 https://security.netapp.com/advisory/ntap-20220602-0009/ https://ubuntu.com/security/notices/USN-5402-1 https://ubuntu.com/security/notices/USN-5402-2 https://www.debian.org/security/2022/dsa-5139 https://www.openssl.org/news/secadv/20220503.txt
|
| openssl-libs | CVE-2022-2068 | MEDIUM | 1:1.0.2k-19.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-2068 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7 https://ubuntu.com/security/notices/USN-5488-1 https://www.openssl.org/news/secadv/20220621.txt
|
| openssl-libs | CVE-2019-1551 | LOW | 1:1.0.2k-19.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00030.html http://packetstormsecurity.com/files/155754/Slackware-Security-Advisory-openssl-Updates.html https://access.redhat.com/security/cve/CVE-2019-1551 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=419102400a2811582a7a3d4a4e317d72e5ce0a8f https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98 https://github.com/openssl/openssl/pull/10575 https://linux.oracle.com/cve/CVE-2019-1551.html https://linux.oracle.com/errata/ELSA-2020-4514.html https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/ https://seclists.org/bugtraq/2019/Dec/39 https://seclists.org/bugtraq/2019/Dec/46 https://security.gentoo.org/glsa/202004-10 https://security.netapp.com/advisory/ntap-20191210-0001/ https://ubuntu.com/security/notices/USN-4376-1 https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4376-1/ https://usn.ubuntu.com/4504-1/ https://www.debian.org/security/2019/dsa-4594 https://www.debian.org/security/2021/dsa-4855 https://www.openssl.org/news/secadv/20191206.txt https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.tenable.com/security/tns-2019-09 https://www.tenable.com/security/tns-2020-03 https://www.tenable.com/security/tns-2020-11 https://www.tenable.com/security/tns-2021-10
|
| openssl-libs | CVE-2019-1563 | LOW | 1:1.0.2k-19.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html https://access.redhat.com/security/cve/CVE-2019-1563 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=08229ad838c50f644d7e928e2eef147b4308ad64 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=631f94db0065c78181ca9ba5546ebc8bb3884b97 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2019-1563.html https://linux.oracle.com/errata/ELSA-2020-1840.html https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/ https://seclists.org/bugtraq/2019/Oct/0 https://seclists.org/bugtraq/2019/Oct/1 https://seclists.org/bugtraq/2019/Sep/25 https://security.gentoo.org/glsa/201911-04 https://security.netapp.com/advisory/ntap-20190919-0002/ https://support.f5.com/csp/article/K97324400?utm_source=f5support&utm_medium=RSS https://ubuntu.com/security/notices/USN-4376-1 https://ubuntu.com/security/notices/USN-4376-2 https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4376-1/ https://usn.ubuntu.com/4376-2/ https://usn.ubuntu.com/4504-1/ https://www.debian.org/security/2019/dsa-4539 https://www.debian.org/security/2019/dsa-4540 https://www.openssl.org/news/secadv/20190910.txt https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.tenable.com/security/tns-2019-09
|
| openssl-libs | CVE-2020-1968 | LOW | 1:1.0.2k-19.el7 | | Expand...Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E) by Robert Merget, Marcus Brinkmann, et al. Thorough Explanation can be found: https://raccoon-attack.com/RacoonAttack.pdf https://access.redhat.com/security/cve/CVE-2020-1968 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968 https://lists.debian.org/debian-lts-announce/2020/09/msg00016.html https://security.netapp.com/advisory/ntap-20200911-0004/ https://ubuntu.com/security/notices/USN-4504-1 https://usn.ubuntu.com/4504-1/ https://www.openssl.org/news/secadv/20200909.txt https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| openssl-libs | CVE-2021-3601 | LOW | 1:1.0.2k-19.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3601 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3601
|
| p11-kit | CVE-2020-29361 | MEDIUM | 0.23.5-3.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-29361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361 https://errata.almalinux.org/8/ALSA-2021-1609.html https://github.com/p11-glue/p11-kit/releases https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2 https://linux.oracle.com/cve/CVE-2020-29361.html https://linux.oracle.com/errata/ELSA-2021-1609.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html https://nvd.nist.gov/vuln/detail/CVE-2020-29361 https://ubuntu.com/security/notices/USN-4677-1 https://ubuntu.com/security/notices/USN-4677-2 https://www.debian.org/security/2021/dsa-4822
|
| p11-kit | CVE-2020-29362 | MEDIUM | 0.23.5-3.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-29362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362 https://errata.almalinux.org/8/ALSA-2021-1609.html https://github.com/p11-glue/p11-kit/releases https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc https://linux.oracle.com/cve/CVE-2020-29362.html https://linux.oracle.com/errata/ELSA-2021-1609.html https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html https://nvd.nist.gov/vuln/detail/CVE-2020-29362 https://ubuntu.com/security/notices/USN-4677-1 https://www.debian.org/security/2021/dsa-4822
|
| p11-kit-trust | CVE-2020-29361 | MEDIUM | 0.23.5-3.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-29361 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29361 https://errata.almalinux.org/8/ALSA-2021-1609.html https://github.com/p11-glue/p11-kit/releases https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2 https://linux.oracle.com/cve/CVE-2020-29361.html https://linux.oracle.com/errata/ELSA-2021-1609.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html https://nvd.nist.gov/vuln/detail/CVE-2020-29361 https://ubuntu.com/security/notices/USN-4677-1 https://ubuntu.com/security/notices/USN-4677-2 https://www.debian.org/security/2021/dsa-4822
|
| p11-kit-trust | CVE-2020-29362 | MEDIUM | 0.23.5-3.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-29362 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29362 https://errata.almalinux.org/8/ALSA-2021-1609.html https://github.com/p11-glue/p11-kit/releases https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc https://linux.oracle.com/cve/CVE-2020-29362.html https://linux.oracle.com/errata/ELSA-2021-1609.html https://lists.debian.org/debian-lts-announce/2021/01/msg00002.html https://lists.freedesktop.org/archives/p11-glue/2020-December/000712.html https://nvd.nist.gov/vuln/detail/CVE-2020-29362 https://ubuntu.com/security/notices/USN-4677-1 https://www.debian.org/security/2021/dsa-4822
|
| pcre | CVE-2017-6004 | MEDIUM | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/96295 http://www.securitytracker.com/id/1037850 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-6004 https://bugs.exim.org/show_bug.cgi?id=2035 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201706-11 https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
|
| pcre | CVE-2017-7186 | MEDIUM | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97030 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7186 https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/ https://bugs.exim.org/show_bug.cgi?id=2052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186 https://security.gentoo.org/glsa/201710-09 https://security.gentoo.org/glsa/201710-25 https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
|
| pcre | CVE-2015-8382 | LOW | 8.32-17.el7 | | Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834 http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510 http://www.openwall.com/lists/oss-security/2015/08/04/2 http://www.openwall.com/lists/oss-security/2015/08/04/3 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/76157 https://access.redhat.com/security/cve/CVE-2015-8382 https://bto.bluecoat.com/security-advisory/sa128 https://bugs.exim.org/show_bug.cgi?id=1537 https://bugzilla.redhat.com/show_bug.cgi?id=1187225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382 https://ubuntu.com/security/notices/USN-2943-1
|
| pcre | CVE-2017-11164 | LOW | 8.32-17.el7 | | Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| pcre | CVE-2017-7244 | LOW | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7244 https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244 https://security.gentoo.org/glsa/201710-25
|
| pcre | CVE-2017-7245 | LOW | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7245 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
| pcre | CVE-2017-7246 | LOW | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7246 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
| pcre | CVE-2020-14155 | LOW | 8.32-17.el7 | | Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
| pcre-devel | CVE-2017-6004 | MEDIUM | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/96295 http://www.securitytracker.com/id/1037850 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-6004 https://bugs.exim.org/show_bug.cgi?id=2035 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6004 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201706-11 https://vcs.pcre.org/pcre/code/trunk/pcre_jit_compile.c?r1=1676&r2=1680&view=patch
|
| pcre-devel | CVE-2017-7186 | MEDIUM | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97030 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7186 https://blogs.gentoo.org/ago/2017/03/14/libpcre-invalid-memory-read-in-match-pcre_exec-c/ https://bugs.exim.org/show_bug.cgi?id=2052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7186 https://security.gentoo.org/glsa/201710-09 https://security.gentoo.org/glsa/201710-25 https://vcs.pcre.org/pcre/code/trunk/pcre_internal.h?r1=1649&r2=1688&sortby=date https://vcs.pcre.org/pcre/code/trunk/pcre_ucd.c?r1=1490&r2=1688&sortby=date https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_internal.h?r1=600&r2=670&sortby=date https://vcs.pcre.org/pcre2/code/trunk/src/pcre2_ucd.c?r1=316&r2=670&sortby=date
|
| pcre-devel | CVE-2015-8382 | LOW | 8.32-17.el7 | | Expand...http://git.php.net/?p=php-src.git;a=commit;h=c351b47ce85a3a147cfa801fa9f0149ab4160834 http://vcs.pcre.org/pcre/code/trunk/ChangeLog?view=markup http://vcs.pcre.org/pcre/code/trunk/pcre_exec.c?r1=1502&r2=1510 http://www.openwall.com/lists/oss-security/2015/08/04/2 http://www.openwall.com/lists/oss-security/2015/08/04/3 http://www.openwall.com/lists/oss-security/2015/11/29/1 http://www.securityfocus.com/bid/76157 https://access.redhat.com/security/cve/CVE-2015-8382 https://bto.bluecoat.com/security-advisory/sa128 https://bugs.exim.org/show_bug.cgi?id=1537 https://bugzilla.redhat.com/show_bug.cgi?id=1187225 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8382 https://ubuntu.com/security/notices/USN-2943-1
|
| pcre-devel | CVE-2017-11164 | LOW | 8.32-17.el7 | | Expand...http://openwall.com/lists/oss-security/2017/07/11/3 http://www.securityfocus.com/bid/99575 https://access.redhat.com/security/cve/CVE-2017-11164 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11164 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E
|
| pcre-devel | CVE-2017-7244 | LOW | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7244 https://blogs.gentoo.org/ago/2017/03/20/libpcre-invalid-memory-read-in-_pcre32_xclass-pcre_xclass-c/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7244 https://security.gentoo.org/glsa/201710-25
|
| pcre-devel | CVE-2017-7245 | LOW | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7245 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
| pcre-devel | CVE-2017-7246 | LOW | 8.32-17.el7 | | Expand...http://www.securityfocus.com/bid/97067 https://access.redhat.com/errata/RHSA-2018:2486 https://access.redhat.com/security/cve/CVE-2017-7246 https://blogs.gentoo.org/ago/2017/03/20/libpcre-two-stack-based-buffer-overflow-write-in-pcre32_copy_substring-pcre_get-c/ https://security.gentoo.org/glsa/201710-25
|
| pcre-devel | CVE-2020-14155 | LOW | 8.32-17.el7 | | Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2021/Feb/14 https://about.gitlab.com/releases/2020/07/01/security-release-13-1-2-release/ https://access.redhat.com/security/cve/CVE-2020-14155 https://bugs.gentoo.org/717920 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155 https://errata.almalinux.org/8/ALSA-2021-4373.html https://linux.oracle.com/cve/CVE-2020-14155.html https://linux.oracle.com/errata/ELSA-2021-4373.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://nvd.nist.gov/vuln/detail/CVE-2020-14155 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT212147 https://ubuntu.com/security/notices/USN-5425-1 https://www.oracle.com/security-alerts/cpuapr2022.html https://www.pcre.org/original/changelog.txt
|
| perl | CVE-2015-8853 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 http://www.openwall.com/lists/oss-security/2016/04/20/5 http://www.openwall.com/lists/oss-security/2016/04/20/7 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/86707 https://access.redhat.com/security/cve/CVE-2015-8853 https://bugzilla.redhat.com/show_bug.cgi?id=1329106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://rt.perl.org/Public/Bug/Display.html?id=123562 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl | CVE-2016-1238 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab http://www.debian.org/security/2016/dsa-3628 http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html http://www.securityfocus.com/bid/92136 http://www.securitytracker.com/id/1036440 https://access.redhat.com/security/cve/CVE-2016-1238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/ https://rt.perl.org/Public/Bug/Display.html?id=127834 https://security.gentoo.org/glsa/201701-75 https://security.gentoo.org/glsa/201812-07
|
| perl | CVE-2016-2381 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/83802 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2016-2381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-2916-1 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl | CVE-2016-6185 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7 http://www.debian.org/security/2016/dsa-3628 http://www.openwall.com/lists/oss-security/2016/07/07/1 http://www.openwall.com/lists/oss-security/2016/07/08/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91685 http://www.securitytracker.com/id/1036260 https://access.redhat.com/security/cve/CVE-2016-6185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/ https://rt.cpan.org/Public/Bug/Display.html?id=115808 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl | CVE-2020-10543 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed https://linux.oracle.com/cve/CVE-2020-10543.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl | CVE-2020-10878 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10878 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c https://linux.oracle.com/cve/CVE-2020-10878.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl | CVE-2020-12723 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-12723 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/Perl/perl5/issues/16947 https://github.com/Perl/perl5/issues/17743 https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a https://linux.oracle.com/cve/CVE-2020-12723.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl | CVE-2020-16156 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
| perl | CVE-2013-7422 | LOW | 4:5.16.3-295.el7 | | Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06 http://www.securityfocus.com/bid/75704 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2013-7422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422 https://security.gentoo.org/glsa/201507-11 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2916-1
|
| perl-Data-Dumper | CVE-2014-4330 | LOW | 2.145-3.el7 | | Expand...http://advisories.mageia.org/MGASA-2014-0406.html http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139441.html http://packetstormsecurity.com/files/128422/Perl-5.20.1-Deep-Recursion-Stack-Overflow.html http://seclists.org/fulldisclosure/2014/Sep/84 http://seclists.org/oss-sec/2014/q3/692 http://secunia.com/advisories/61441 http://secunia.com/advisories/61961 http://www.mandriva.com/security/advisories?name=MDVSA-2015:136 http://www.nntp.perl.org/group/perl.perl5.porters/2014/09/msg220118.html http://www.securityfocus.com/archive/1/533543/100/0/threaded http://www.securityfocus.com/bid/70142 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2014-4330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4330 https://exchange.xforce.ibmcloud.com/vulnerabilities/96216 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://metacpan.org/pod/distribution/Data-Dumper/Changes https://ubuntu.com/security/notices/USN-2916-1 https://www.lsexperts.de/advisories/lse-2014-06-10.txt
|
| perl-File-Path | CVE-2017-6512 | LOW | 2.09-2.el7 | | Expand...http://cpansearch.perl.org/src/JKEENAN/File-Path-2.13/Changes http://security.cucumberlinux.com/security/details.php?id=153 http://www.debian.org/security/2017/dsa-3873 http://www.securityfocus.com/bid/99180 http://www.securitytracker.com/id/1038610 https://access.redhat.com/security/cve/CVE-2017-6512 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6512 https://rt.cpan.org/Ticket/Display.html?id=121951 https://security.gentoo.org/glsa/201709-12 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl-Git | CVE-2017-14867 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://www.openwall.com/lists/oss-security/2017/09/26/9 http://www.securityfocus.com/bid/101060 http://www.securitytracker.com/id/1039431 https://access.redhat.com/security/cve/CVE-2017-14867 https://bugs.debian.org/876854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867 https://lists.debian.org/debian-security-announce/2017/msg00246.html https://public-inbox.org/git/xmqqy3p29ekj.fsf@gitster.mtv.corp.google.com/T/#u https://ubuntu.com/security/notices/USN-3438-1 https://www.debian.org/security/2017/dsa-3984
|
| perl-Git | CVE-2018-1000021 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://www.batterystapl.es/2018/01/security-implications-of-ansi-escape.html https://access.redhat.com/security/cve/CVE-2018-1000021 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000021
|
| perl-Git | CVE-2019-1348 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/errata/RHSA-2020:0228 https://access.redhat.com/security/cve/CVE-2019-1348 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1348 https://github.com/git/git/security/advisories/GHSA-2pw3-gwg9-8pqr https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://linux.oracle.com/cve/CVE-2019-1348.html https://linux.oracle.com/errata/ELSA-2019-4356.html https://lore.kernel.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/T/#u https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://security.gentoo.org/glsa/202003-42 https://support.apple.com/kb/HT210729 https://ubuntu.com/security/notices/USN-4220-1
|
| perl-Git | CVE-2019-1349 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00056.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/errata/RHSA-2020:0228 https://access.redhat.com/security/cve/CVE-2019-1349 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1349 https://github.com/git/git/security/advisories/GHSA-4qvh-qvv7-frc7 https://groups.google.com/forum/?fromgroups#!topic/git-packagers/AWRBO_5gqa4 https://linux.oracle.com/cve/CVE-2019-1349.html https://linux.oracle.com/errata/ELSA-2019-4356.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349 https://public-inbox.org/git/xmqqr21cqcn9.fsf@gitster-ct.c.googlers.com/ https://security.gentoo.org/glsa/202003-30 https://ubuntu.com/security/notices/USN-4220-1
|
| perl-Git | CVE-2021-21300 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://packetstormsecurity.com/files/163978/Git-LFS-Clone-Command-Execution.html http://seclists.org/fulldisclosure/2021/Apr/60 http://www.openwall.com/lists/oss-security/2021/03/09/3 https://access.redhat.com/security/cve/CVE-2021-21300 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21300 https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks https://git-scm.com/docs/gitattributes#_filter https://github.com/git/git/commit/684dd4c2b414bcf648505e74498a608f28de4592 https://github.com/git/git/security/advisories/GHSA-8prw-h3cq-mghm https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBPNGLQSYJHLZZ37BO42YY6S5OTIF4L4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCLJJLKKMS5WRFO6C475AOUZTWQLIARX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LMXX2POK5X576BSDWSXGU7EIK6I72ERU/ https://lore.kernel.org/git/xmqqim6019yd.fsf@gitster.c.googlers.com/ https://security.gentoo.org/glsa/202104-01 https://support.apple.com/kb/HT212320 https://ubuntu.com/security/notices/USN-4761-1
|
| perl-Git | CVE-2021-40330 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...https://access.redhat.com/security/cve/CVE-2021-40330 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40330 https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473 https://github.com/git/git/compare/v2.30.0...v2.30.1 https://nvd.nist.gov/vuln/detail/CVE-2021-40330 https://ubuntu.com/security/notices/USN-5076-1
|
| perl-Git | CVE-2022-24765 | MEDIUM | 1.8.3.1-23.el7_8 | | Expand...http://seclists.org/fulldisclosure/2022/May/31 http://www.openwall.com/lists/oss-security/2022/04/12/7 https://access.redhat.com/security/cve/CVE-2022-24765 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765 https://git-scm.com/book/en/v2/Appendix-A%3A-Git-in-Other-Environments-Git-in-Bash https://git-scm.com/docs/git#Documentation/git.txt-codeGITCEILINGDIRECTORIEScode https://github.com/git-for-windows/git/security/advisories/GHSA-vw2c-22j4-2fh2 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PTN5NYEHYN2OQSHSAMCNICZNK2U4QH6/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BENQYTDGUL6TF3UALY6GSIEXIHUIYNWM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLP42KIZ6HACTVZMZLJLFJQ4W2XYT27M/ https://support.apple.com/kb/HT213261 https://ubuntu.com/security/notices/USN-5376-1 https://ubuntu.com/security/notices/USN-5376-2 https://ubuntu.com/security/notices/USN-5376-3
|
| perl-Git | CVE-2017-15298 | LOW | 1.8.3.1-23.el7_8 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html https://access.redhat.com/security/cve/CVE-2017-15298 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15298 https://github.com/Katee/git-bomb https://kate.io/blog/git-bomb/ https://public-inbox.org/git/20171013123521.hop5hrfsyagu7znl@sigill.intra.peff.net/T/#m58c560c18f93476e23110a0656a8d525170d14a2 https://ubuntu.com/security/notices/USN-3829-1 https://usn.ubuntu.com/3829-1/
|
| perl-Pod-Escapes | CVE-2015-8853 | MEDIUM | 1:1.04-295.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 http://www.openwall.com/lists/oss-security/2016/04/20/5 http://www.openwall.com/lists/oss-security/2016/04/20/7 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/86707 https://access.redhat.com/security/cve/CVE-2015-8853 https://bugzilla.redhat.com/show_bug.cgi?id=1329106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://rt.perl.org/Public/Bug/Display.html?id=123562 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl-Pod-Escapes | CVE-2016-1238 | MEDIUM | 1:1.04-295.el7 | | Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab http://www.debian.org/security/2016/dsa-3628 http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html http://www.securityfocus.com/bid/92136 http://www.securitytracker.com/id/1036440 https://access.redhat.com/security/cve/CVE-2016-1238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/ https://rt.perl.org/Public/Bug/Display.html?id=127834 https://security.gentoo.org/glsa/201701-75 https://security.gentoo.org/glsa/201812-07
|
| perl-Pod-Escapes | CVE-2016-2381 | MEDIUM | 1:1.04-295.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/83802 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2016-2381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-2916-1 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-Pod-Escapes | CVE-2016-6185 | MEDIUM | 1:1.04-295.el7 | | Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7 http://www.debian.org/security/2016/dsa-3628 http://www.openwall.com/lists/oss-security/2016/07/07/1 http://www.openwall.com/lists/oss-security/2016/07/08/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91685 http://www.securitytracker.com/id/1036260 https://access.redhat.com/security/cve/CVE-2016-6185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/ https://rt.cpan.org/Public/Bug/Display.html?id=115808 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl-Pod-Escapes | CVE-2020-10543 | MEDIUM | 1:1.04-295.el7 | 1:1.04-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed https://linux.oracle.com/cve/CVE-2020-10543.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-Pod-Escapes | CVE-2020-10878 | MEDIUM | 1:1.04-295.el7 | 1:1.04-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10878 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c https://linux.oracle.com/cve/CVE-2020-10878.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-Pod-Escapes | CVE-2020-12723 | MEDIUM | 1:1.04-295.el7 | 1:1.04-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-12723 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/Perl/perl5/issues/16947 https://github.com/Perl/perl5/issues/17743 https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a https://linux.oracle.com/cve/CVE-2020-12723.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-Pod-Escapes | CVE-2020-16156 | MEDIUM | 1:1.04-295.el7 | | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
| perl-Pod-Escapes | CVE-2013-7422 | LOW | 1:1.04-295.el7 | | Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06 http://www.securityfocus.com/bid/75704 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2013-7422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422 https://security.gentoo.org/glsa/201507-11 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2916-1
|
| perl-libs | CVE-2015-8853 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 http://www.openwall.com/lists/oss-security/2016/04/20/5 http://www.openwall.com/lists/oss-security/2016/04/20/7 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/86707 https://access.redhat.com/security/cve/CVE-2015-8853 https://bugzilla.redhat.com/show_bug.cgi?id=1329106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://rt.perl.org/Public/Bug/Display.html?id=123562 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl-libs | CVE-2016-1238 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab http://www.debian.org/security/2016/dsa-3628 http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html http://www.securityfocus.com/bid/92136 http://www.securitytracker.com/id/1036440 https://access.redhat.com/security/cve/CVE-2016-1238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/ https://rt.perl.org/Public/Bug/Display.html?id=127834 https://security.gentoo.org/glsa/201701-75 https://security.gentoo.org/glsa/201812-07
|
| perl-libs | CVE-2016-2381 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/83802 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2016-2381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-2916-1 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-libs | CVE-2016-6185 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7 http://www.debian.org/security/2016/dsa-3628 http://www.openwall.com/lists/oss-security/2016/07/07/1 http://www.openwall.com/lists/oss-security/2016/07/08/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91685 http://www.securitytracker.com/id/1036260 https://access.redhat.com/security/cve/CVE-2016-6185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/ https://rt.cpan.org/Public/Bug/Display.html?id=115808 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl-libs | CVE-2020-10543 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed https://linux.oracle.com/cve/CVE-2020-10543.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-libs | CVE-2020-10878 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10878 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c https://linux.oracle.com/cve/CVE-2020-10878.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-libs | CVE-2020-12723 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-12723 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/Perl/perl5/issues/16947 https://github.com/Perl/perl5/issues/17743 https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a https://linux.oracle.com/cve/CVE-2020-12723.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-libs | CVE-2020-16156 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
| perl-libs | CVE-2013-7422 | LOW | 4:5.16.3-295.el7 | | Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06 http://www.securityfocus.com/bid/75704 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2013-7422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422 https://security.gentoo.org/glsa/201507-11 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2916-1
|
| perl-macros | CVE-2015-8853 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183592.html http://perl5.git.perl.org/perl.git/commitdiff/22b433eff9a1ffa2454e18405a56650f07b385b5 http://www.openwall.com/lists/oss-security/2016/04/20/5 http://www.openwall.com/lists/oss-security/2016/04/20/7 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/86707 https://access.redhat.com/security/cve/CVE-2015-8853 https://bugzilla.redhat.com/show_bug.cgi?id=1329106 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8853 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://rt.perl.org/Public/Bug/Display.html?id=123562 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl-macros | CVE-2016-1238 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://ledgersmbdev.blogspot.ca/2016/07/notes-on-security-separation-of.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00002.html http://perl5.git.perl.org/perl.git/commit/cee96d52c39b1e7b36e1c62d38bcd8d86e9a41ab http://www.debian.org/security/2016/dsa-3628 http://www.nntp.perl.org/group/perl.perl5.porters/2016/07/msg238271.html http://www.securityfocus.com/bid/92136 http://www.securitytracker.com/id/1036440 https://access.redhat.com/security/cve/CVE-2016-1238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1238 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://lists.apache.org/thread.html/7f6a16bc0fd0fd5e67c7fd95bd655069a2ac7d1f88e42d3c853e601c@%3Cannounce.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/11/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2FBQOCV3GBAN2EYZUM3CFDJ4ECA3GZOK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOFRQWJRP2NQJEYEWOMECVW3HAMD5SYN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZBNQH3DMI7HDELJAZ4TFJJANHXOEDWH/ https://rt.perl.org/Public/Bug/Display.html?id=127834 https://security.gentoo.org/glsa/201701-75 https://security.gentoo.org/glsa/201812-07
|
| perl-macros | CVE-2016-2381 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html http://perl5.git.perl.org/perl.git/commitdiff/ae37b791a73a9e78dedb89fb2429d2628cf58076 http://www.debian.org/security/2016/dsa-3501 http://www.gossamer-threads.com/lists/perl/porters/326387 http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/83802 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2016-2381 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381 https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-2916-1 https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
| perl-macros | CVE-2016-6185 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://perl5.git.perl.org/perl.git/commitdiff/08e3451d7 http://www.debian.org/security/2016/dsa-3628 http://www.openwall.com/lists/oss-security/2016/07/07/1 http://www.openwall.com/lists/oss-security/2016/07/08/5 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91685 http://www.securitytracker.com/id/1036260 https://access.redhat.com/security/cve/CVE-2016-6185 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6185 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5RFDMASVZLFZYBB2GNTZXU6I76E4NA4V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ITYZJXQH24X2F2LAOQEQAC5KXLYJTJ76/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PRIPTDA6XINBVEJXI2NGLKVEINBREHTN/ https://rt.cpan.org/Public/Bug/Display.html?id=115808 https://security.gentoo.org/glsa/201701-75 https://ubuntu.com/security/notices/USN-3625-1 https://ubuntu.com/security/notices/USN-3625-2 https://usn.ubuntu.com/3625-1/ https://usn.ubuntu.com/3625-2/
|
| perl-macros | CVE-2020-10543 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10543 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed https://linux.oracle.com/cve/CVE-2020-10543.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-macros | CVE-2020-10878 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-10878 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c https://linux.oracle.com/cve/CVE-2020-10878.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-macros | CVE-2020-12723 | MEDIUM | 4:5.16.3-295.el7 | 4:5.16.3-299.el7_9 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00044.html https://access.redhat.com/security/cve/CVE-2020-12723 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723 https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3 https://github.com/Perl/perl5/issues/16947 https://github.com/Perl/perl5/issues/17743 https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a https://linux.oracle.com/cve/CVE-2020-12723.html https://linux.oracle.com/errata/ELSA-2021-9238.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN3TTBO5KSGWE5IRIKDJ5JSQRH7ANNXE/ https://metacpan.org/pod/release/XSAWYERX/perl-5.28.3/pod/perldelta.pod https://metacpan.org/pod/release/XSAWYERX/perl-5.30.3/pod/perldelta.pod https://security.gentoo.org/glsa/202006-03 https://security.netapp.com/advisory/ntap-20200611-0001/ https://ubuntu.com/security/notices/USN-4602-1 https://ubuntu.com/security/notices/USN-4602-2 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpuapr2022.html https://www.oracle.com/security-alerts/cpujan2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2020.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| perl-macros | CVE-2020-16156 | MEDIUM | 4:5.16.3-295.el7 | | Expand...http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html https://access.redhat.com/security/cve/CVE-2020-16156 https://blog.hackeriet.no/cpan-signature-verification-vulnerabilities/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16156 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD6RYOJII7HRJ6WVORFNVTYNOFY5JDXN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SZ32AJIV4RHJMLWLU5QULGKMMIHYOMDC/ https://metacpan.org/pod/distribution/CPAN/scripts/cpan
|
| perl-macros | CVE-2013-7422 | LOW | 4:5.16.3-295.el7 | | Expand...http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://perl5.git.perl.org/perl.git/commit/0c2990d652e985784f095bba4bc356481a66aa06 http://www.securityfocus.com/bid/75704 http://www.ubuntu.com/usn/USN-2916-1 https://access.redhat.com/security/cve/CVE-2013-7422 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7422 https://security.gentoo.org/glsa/201507-11 https://support.apple.com/kb/HT205031 https://ubuntu.com/security/notices/USN-2916-1
|
| procps-ng | CVE-2018-1121 | LOW | 3.3.10-26.el7 | | Expand...http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1121 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1121 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
| procps-ng | CVE-2018-1123 | LOW | 3.3.10-26.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1123 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1123 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1123 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://security.gentoo.org/glsa/201805-14 https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.exploit-db.com/exploits/44806/ https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
| procps-ng | CVE-2018-1125 | LOW | 3.3.10-26.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00058.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00059.html http://seclists.org/oss-sec/2018/q2/122 http://www.securityfocus.com/bid/104214 https://access.redhat.com/security/cve/CVE-2018-1125 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1125 https://lists.debian.org/debian-lts-announce/2018/05/msg00021.html https://ubuntu.com/security/notices/USN-3658-1 https://ubuntu.com/security/notices/USN-3658-3 https://usn.ubuntu.com/3658-1/ https://usn.ubuntu.com/3658-3/ https://www.debian.org/security/2018/dsa-4208 https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
|
| python | CVE-2013-1664 | MEDIUM | 2.7.5-86.el7 | | Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html http://bugs.python.org/issue17239 http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html http://rhn.redhat.com/errata/RHSA-2013-0657.html http://rhn.redhat.com/errata/RHSA-2013-0658.html http://rhn.redhat.com/errata/RHSA-2013-0670.html http://ubuntu.com/usn/usn-1757-1 http://www.openwall.com/lists/oss-security/2013/02/19/2 http://www.openwall.com/lists/oss-security/2013/02/19/4 https://access.redhat.com/security/cve/CVE-2013-1664 https://bugs.launchpad.net/nova/+bug/1100282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664 https://ubuntu.com/security/notices/USN-1730-1 https://ubuntu.com/security/notices/USN-1731-1 https://ubuntu.com/security/notices/USN-1734-1 https://ubuntu.com/security/notices/USN-1757-1 https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python | CVE-2013-1665 | MEDIUM | 2.7.5-86.el7 | | Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html http://bugs.python.org/issue17239 http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html http://rhn.redhat.com/errata/RHSA-2013-0657.html http://rhn.redhat.com/errata/RHSA-2013-0658.html http://rhn.redhat.com/errata/RHSA-2013-0670.html http://ubuntu.com/usn/usn-1757-1 http://www.debian.org/security/2013/dsa-2634 http://www.openwall.com/lists/oss-security/2013/02/19/2 http://www.openwall.com/lists/oss-security/2013/02/19/4 https://access.redhat.com/security/cve/CVE-2013-1665 https://bugs.launchpad.net/keystone/+bug/1100279 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665 https://ubuntu.com/security/notices/USN-1730-1 https://ubuntu.com/security/notices/USN-1757-1 https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python | CVE-2013-7040 | MEDIUM | 2.7.5-86.el7 | | Expand...http://bugs.python.org/issue14621 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://www.openwall.com/lists/oss-security/2013/12/09/13 http://www.openwall.com/lists/oss-security/2013/12/09/3 http://www.securityfocus.com/bid/64194 https://access.redhat.com/security/cve/CVE-2013-7040 https://support.apple.com/kb/HT205031
|
| python | CVE-2017-1000158 | MEDIUM | 2.7.5-86.el7 | | Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
| python | CVE-2018-20852 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/errata/RHSA-2019:3948 https://access.redhat.com/security/cve/CVE-2018-20852 https://bugs.python.org/issue35121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852 https://errata.almalinux.org/8/ALSA-2020-1605.html https://linux.oracle.com/cve/CVE-2018-20852.html https://linux.oracle.com/errata/ELSA-2020-1764.html https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ https://python-security.readthedocs.io/vuln/cookie-domain-check.html https://security.gentoo.org/glsa/202003-26 https://ubuntu.com/security/notices/USN-4127-1 https://ubuntu.com/security/notices/USN-4127-2 https://usn.ubuntu.com/4127-1/ https://usn.ubuntu.com/4127-2/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
| python | CVE-2019-16056 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/errata/RHSA-2019:3948 https://access.redhat.com/security/cve/CVE-2019-16056 https://bugs.python.org/issue34155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056 https://errata.almalinux.org/8/ALSA-2020-1605.html https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9 https://linux.oracle.com/cve/CVE-2019-16056.html https://linux.oracle.com/errata/ELSA-2020-1764.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ https://security.netapp.com/advisory/ntap-20190926-0005/ https://ubuntu.com/security/notices/USN-4151-1 https://ubuntu.com/security/notices/USN-4151-2 https://usn.ubuntu.com/4151-1/ https://usn.ubuntu.com/4151-2/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
| python | CVE-2019-16935 | MEDIUM | 2.7.5-86.el7 | 2.7.5-89.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2019-16935 https://bugs.python.org/issue38243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935 https://errata.almalinux.org/8/ALSA-2020-1605.html https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897 https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213 https://github.com/python/cpython/pull/16373 https://linux.oracle.com/cve/CVE-2019-16935.html https://linux.oracle.com/errata/ELSA-2020-4433.html https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ https://security.netapp.com/advisory/ntap-20191017-0004/ https://ubuntu.com/security/notices/USN-4151-1 https://ubuntu.com/security/notices/USN-4151-2 https://usn.ubuntu.com/4151-1/ https://usn.ubuntu.com/4151-2/ https://www.oracle.com/security-alerts/cpujul2020.html
|
| python | CVE-2019-18348 | MEDIUM | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html https://access.redhat.com/security/cve/CVE-2019-18348 https://bugs.python.org/issue30458#msg347282 https://bugzilla.redhat.com/show_bug.cgi?id=1727276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348 https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/ https://nvd.nist.gov/vuln/detail/CVE-2019-18348 https://security.netapp.com/advisory/ntap-20191107-0004/ https://ubuntu.com/security/notices/USN-4333-1 https://ubuntu.com/security/notices/USN-4333-2 https://usn.ubuntu.com/4333-1/ https://usn.ubuntu.com/4333-2/ https://www.oracle.com/security-alerts/cpuoct2020.html
|
| python | CVE-2019-20907 | MEDIUM | 2.7.5-86.el7 | 2.7.5-90.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html https://access.redhat.com/security/cve/CVE-2019-20907 https://bugs.python.org/issue39017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907 https://errata.almalinux.org/8/ALSA-2020-4654.html https://github.com/python/cpython/pull/21454 https://linux.oracle.com/cve/CVE-2019-20907.html https://linux.oracle.com/errata/ELSA-2020-5010.html https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/ https://nvd.nist.gov/vuln/detail/CVE-2019-20907 https://security.gentoo.org/glsa/202008-01 https://security.netapp.com/advisory/ntap-20200731-0002/ https://ubuntu.com/security/notices/USN-4428-1 https://ubuntu.com/security/notices/USN-4754-3 https://usn.ubuntu.com/4428-1/ https://www.oracle.com/security-alerts/cpujan2021.html
|
| python | CVE-2020-26116 | MEDIUM | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html https://access.redhat.com/security/cve/CVE-2020-26116 https://bugs.python.org/issue39603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116 https://errata.almalinux.org/8/ALSA-2021-1879.html https://linux.oracle.com/cve/CVE-2020-26116.html https://linux.oracle.com/errata/ELSA-2021-1879.html https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/ https://nvd.nist.gov/vuln/detail/CVE-2020-26116 https://python-security.readthedocs.io/vuln/http-header-injection-method.html https://security.gentoo.org/glsa/202101-18 https://security.netapp.com/advisory/ntap-20201023-0001/ https://ubuntu.com/security/notices/USN-4581-1 https://ubuntu.com/security/notices/USN-4754-3 https://usn.ubuntu.com/4581-1/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python | CVE-2020-27619 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27619 https://bugs.python.org/issue41944 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619 https://errata.almalinux.org/8/ALSA-2021-4162.html https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b https://linux.oracle.com/cve/CVE-2020-27619.html https://linux.oracle.com/errata/ELSA-2021-4151.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://nvd.nist.gov/vuln/detail/CVE-2020-27619 https://security.netapp.com/advisory/ntap-20201123-0004/ https://ubuntu.com/security/notices/USN-4754-1 https://ubuntu.com/security/notices/USN-4754-3
|
| python | CVE-2020-8492 | MEDIUM | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html https://access.redhat.com/security/cve/CVE-2020-8492 https://bugs.python.org/issue39503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492 https://errata.almalinux.org/8/ALSA-2020-4641.html https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4 https://github.com/python/cpython/pull/18284 https://linux.oracle.com/cve/CVE-2020-8492.html https://linux.oracle.com/errata/ELSA-2020-4641.html https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/ https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html https://security.gentoo.org/glsa/202005-09 https://security.netapp.com/advisory/ntap-20200221-0001/ https://ubuntu.com/security/notices/USN-4333-1 https://ubuntu.com/security/notices/USN-4333-2 https://ubuntu.com/security/notices/USN-4754-3 https://ubuntu.com/security/notices/USN-5200-1 https://usn.ubuntu.com/4333-1/ https://usn.ubuntu.com/4333-2/
|
| python | CVE-2021-23336 | MEDIUM | 2.7.5-86.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4 http://www.openwall.com/lists/oss-security/2021/05/01/2 https://access.redhat.com/security/cve/CVE-2021-23336 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336 https://errata.almalinux.org/8/ALSA-2021-4162.html https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master) https://github.com/python/cpython/pull/24297 https://linux.oracle.com/cve/CVE-2021-23336.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/ https://nvd.nist.gov/vuln/detail/CVE-2021-23336 https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210326-0004/ https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/ https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933 https://ubuntu.com/security/notices/USN-4742-1 https://www.djangoproject.com/weblog/2021/feb/19/security-releases/ https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python | CVE-2021-3177 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3177 https://bugs.python.org/issue42938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177 https://errata.almalinux.org/8/ALSA-2021-1879.html https://github.com/python/cpython/pull/24239 https://linux.oracle.com/cve/CVE-2021-3177.html https://linux.oracle.com/errata/ELSA-2021-9130.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/ https://news.ycombinator.com/item?id=26185005 https://nvd.nist.gov/vuln/detail/CVE-2021-3177 https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html https://security.gentoo.org/glsa/202101-18 https://security.netapp.com/advisory/ntap-20210226-0003/ https://ubuntu.com/security/notices/USN-4754-1 https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7) https://ubuntu.com/security/notices/USN-4754-3 https://ubuntu.com/security/notices/USN-4754-4 https://ubuntu.com/security/notices/USN-4754-5 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python | CVE-2021-3733 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3733 https://bugs.python.org/issue43075 https://bugzilla.redhat.com/show_bug.cgi?id=1995234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final https://errata.almalinux.org/8/ALSA-2022-1821.html https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14) https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master) https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5) https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11) https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10) https://github.com/python/cpython/pull/24391 https://linux.oracle.com/cve/CVE-2021-3733.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://nvd.nist.gov/vuln/detail/CVE-2021-3733 https://security.netapp.com/advisory/ntap-20220407-0001/ https://ubuntu.com/security/CVE-2021-3733 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1
|
| python | CVE-2021-4189 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
| python | CVE-2022-0391 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| python | CVE-2018-1000030 | LOW | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-1000030 https://bugs.python.org/issue31530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030 https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view https://security.gentoo.org/glsa/201811-02 https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0 https://www.oracle.com/security-alerts/cpujan2020.html
|
| python | CVE-2019-9674 | LOW | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html https://access.redhat.com/security/cve/CVE-2019-9674 https://bugs.python.org/issue36260 https://bugs.python.org/issue36462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674 https://github.com/python/cpython/blob/master/Lib/zipfile.py https://nvd.nist.gov/vuln/detail/CVE-2019-9674 https://python-security.readthedocs.io/security.html#archives-and-zip-bomb https://security.netapp.com/advisory/ntap-20200221-0003/ https://ubuntu.com/security/notices/USN-4428-1 https://ubuntu.com/security/notices/USN-4754-3 https://usn.ubuntu.com/4428-1/ https://www.python.org/news/security/
|
| python | CVE-2021-3737 | LOW | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://security.netapp.com/advisory/ntap-20220407-0009/ https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
| python-libs | CVE-2013-1664 | MEDIUM | 2.7.5-86.el7 | | Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html http://bugs.python.org/issue17239 http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html http://rhn.redhat.com/errata/RHSA-2013-0657.html http://rhn.redhat.com/errata/RHSA-2013-0658.html http://rhn.redhat.com/errata/RHSA-2013-0670.html http://ubuntu.com/usn/usn-1757-1 http://www.openwall.com/lists/oss-security/2013/02/19/2 http://www.openwall.com/lists/oss-security/2013/02/19/4 https://access.redhat.com/security/cve/CVE-2013-1664 https://bugs.launchpad.net/nova/+bug/1100282 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1664 https://ubuntu.com/security/notices/USN-1730-1 https://ubuntu.com/security/notices/USN-1731-1 https://ubuntu.com/security/notices/USN-1734-1 https://ubuntu.com/security/notices/USN-1757-1 https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python-libs | CVE-2013-1665 | MEDIUM | 2.7.5-86.el7 | | Expand...http://blog.python.org/2013/02/announcing-defusedxml-fixes-for-xml.html http://bugs.python.org/issue17239 http://lists.openstack.org/pipermail/openstack-announce/2013-February/000078.html http://rhn.redhat.com/errata/RHSA-2013-0657.html http://rhn.redhat.com/errata/RHSA-2013-0658.html http://rhn.redhat.com/errata/RHSA-2013-0670.html http://ubuntu.com/usn/usn-1757-1 http://www.debian.org/security/2013/dsa-2634 http://www.openwall.com/lists/oss-security/2013/02/19/2 http://www.openwall.com/lists/oss-security/2013/02/19/4 https://access.redhat.com/security/cve/CVE-2013-1665 https://bugs.launchpad.net/keystone/+bug/1100279 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1665 https://ubuntu.com/security/notices/USN-1730-1 https://ubuntu.com/security/notices/USN-1757-1 https://www.djangoproject.com/weblog/2013/feb/19/security/
|
| python-libs | CVE-2013-7040 | MEDIUM | 2.7.5-86.el7 | | Expand...http://bugs.python.org/issue14621 http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://www.openwall.com/lists/oss-security/2013/12/09/13 http://www.openwall.com/lists/oss-security/2013/12/09/3 http://www.securityfocus.com/bid/64194 https://access.redhat.com/security/cve/CVE-2013-7040 https://support.apple.com/kb/HT205031
|
| python-libs | CVE-2017-1000158 | MEDIUM | 2.7.5-86.el7 | | Expand...http://python-security.readthedocs.io/vuln/cve-2017-1000158_pystring_decodeescape_integer_overflow.html http://www.securitytracker.com/id/1039890 https://access.redhat.com/security/cve/CVE-2017-1000158 https://bugs.python.org/issue30657 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000158 https://github.com/python/cpython/commit/c3c9db89273fabc62ea1b48389d9a3000c1c03ae https://lists.debian.org/debian-lts-announce/2017/11/msg00035.html https://lists.debian.org/debian-lts-announce/2017/11/msg00036.html https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html https://lists.debian.org/debian-lts-announce/2018/09/msg00031.html https://security.gentoo.org/glsa/201805-02 https://ubuntu.com/security/notices/USN-3496-1 https://ubuntu.com/security/notices/USN-3496-2 https://ubuntu.com/security/notices/USN-3496-3 https://www.debian.org/security/2018/dsa-4307
|
| python-libs | CVE-2018-20852 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00071.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00074.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/errata/RHSA-2019:3948 https://access.redhat.com/security/cve/CVE-2018-20852 https://bugs.python.org/issue35121 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852 https://errata.almalinux.org/8/ALSA-2020-1605.html https://linux.oracle.com/cve/CVE-2018-20852.html https://linux.oracle.com/errata/ELSA-2020-1764.html https://lists.debian.org/debian-lts-announce/2019/08/msg00022.html https://lists.debian.org/debian-lts-announce/2019/08/msg00040.html https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ https://python-security.readthedocs.io/vuln/cookie-domain-check.html https://security.gentoo.org/glsa/202003-26 https://ubuntu.com/security/notices/USN-4127-1 https://ubuntu.com/security/notices/USN-4127-2 https://usn.ubuntu.com/4127-1/ https://usn.ubuntu.com/4127-2/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
| python-libs | CVE-2019-16056 | MEDIUM | 2.7.5-86.el7 | 2.7.5-88.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/errata/RHSA-2019:3725 https://access.redhat.com/errata/RHSA-2019:3948 https://access.redhat.com/security/cve/CVE-2019-16056 https://bugs.python.org/issue34155 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056 https://errata.almalinux.org/8/ALSA-2020-1605.html https://github.com/python/cpython/commit/8cb65d1381b027f0b09ee36bfed7f35bb4dec9a9 https://linux.oracle.com/cve/CVE-2019-16056.html https://linux.oracle.com/errata/ELSA-2020-1764.html https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/09/msg00018.html https://lists.debian.org/debian-lts-announce/2019/09/msg00019.html https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K4KZEFP6E4YPYB52AF4WXCUDSGQOTF37/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QASRD4E2G65GGEHYKVHYCXB2XWAGTNL4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QP46PQSUKYPGWTADQ67NOV3BUN6JM34Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDQQ56P7ZZR64XV5DUVWNSNXKKEXUG2J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ https://security.netapp.com/advisory/ntap-20190926-0005/ https://ubuntu.com/security/notices/USN-4151-1 https://ubuntu.com/security/notices/USN-4151-2 https://usn.ubuntu.com/4151-1/ https://usn.ubuntu.com/4151-2/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujul2020.html
|
| python-libs | CVE-2019-16935 | MEDIUM | 2.7.5-86.el7 | 2.7.5-89.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00062.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00063.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00012.html http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html https://access.redhat.com/security/cve/CVE-2019-16935 https://bugs.python.org/issue38243 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935 https://errata.almalinux.org/8/ALSA-2020-1605.html https://github.com/python/cpython/blob/35c0809158be7feae4c4f877a08b93baea2d8291/Lib/xmlrpc/server.py#L897 https://github.com/python/cpython/blob/e007860b8b3609ce0bc62b1780efaa06241520bd/Lib/DocXMLRPCServer.py#L213 https://github.com/python/cpython/pull/16373 https://linux.oracle.com/cve/CVE-2019-16935.html https://linux.oracle.com/errata/ELSA-2020-4433.html https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEARDOTXCYPYELKBD2KWZ27GSPXDI3GQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/COATURTCY7G67AYI6UDV5B2JZTBCKIDX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K7HNVIFMETMFWWWUNTB72KYJYXCZOS5V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYGESQSGIHDCIGOBVF7VXCMIE6YDWRYB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBTGPBUABGXZ7WH7677OEM3NSP6ZEA76/ https://security.netapp.com/advisory/ntap-20191017-0004/ https://ubuntu.com/security/notices/USN-4151-1 https://ubuntu.com/security/notices/USN-4151-2 https://usn.ubuntu.com/4151-1/ https://usn.ubuntu.com/4151-2/ https://www.oracle.com/security-alerts/cpujul2020.html
|
| python-libs | CVE-2019-18348 | MEDIUM | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html https://access.redhat.com/security/cve/CVE-2019-18348 https://bugs.python.org/issue30458#msg347282 https://bugzilla.redhat.com/show_bug.cgi?id=1727276 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18348 https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/ https://nvd.nist.gov/vuln/detail/CVE-2019-18348 https://security.netapp.com/advisory/ntap-20191107-0004/ https://ubuntu.com/security/notices/USN-4333-1 https://ubuntu.com/security/notices/USN-4333-2 https://usn.ubuntu.com/4333-1/ https://usn.ubuntu.com/4333-2/ https://www.oracle.com/security-alerts/cpuoct2020.html
|
| python-libs | CVE-2019-20907 | MEDIUM | 2.7.5-86.el7 | 2.7.5-90.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html https://access.redhat.com/security/cve/CVE-2019-20907 https://bugs.python.org/issue39017 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20907 https://errata.almalinux.org/8/ALSA-2020-4654.html https://github.com/python/cpython/pull/21454 https://linux.oracle.com/cve/CVE-2019-20907.html https://linux.oracle.com/errata/ELSA-2020-5010.html https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36XI3EEQNMHGOZEI63Y7UV6XZRELYEAU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAXHCY4V3LPAAJOBCJ26ISZ4NUXQXTUZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CNHPQGSP2YM3JAUD2VAMPXTIUQTZ2M2U/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CTUNTBJ3POHONQOTLEZC46POCIYYTAKZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE4O3PNDNNOMSKHNUKZKD3NGHIFUFDPX/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTBKKOLFFNHG6CM4ACDX4APHSD5ZX5N4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDKKRXLNVXRF6VGERZSR3OMQR5D5QI6I/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TOGKLGTXZLHQQFBVCAPSUDA6DOOJFNRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V3TALOUBYU2MQD4BPLRTDQUMBKGCAXUA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V53P2YOLEQH4J7S5QHXMKMZYFTVVMTMO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VT4AF72TJ2XNIKCR4WEBR7URBJJ4YZRD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILCHHTNLH4GG4GSQBX2MZRKZBXOLCKE/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YSL3XWVDMSMKO23HR74AJQ6VEM3C2NTS/ https://nvd.nist.gov/vuln/detail/CVE-2019-20907 https://security.gentoo.org/glsa/202008-01 https://security.netapp.com/advisory/ntap-20200731-0002/ https://ubuntu.com/security/notices/USN-4428-1 https://ubuntu.com/security/notices/USN-4754-3 https://usn.ubuntu.com/4428-1/ https://www.oracle.com/security-alerts/cpujan2021.html
|
| python-libs | CVE-2020-26116 | MEDIUM | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00027.html https://access.redhat.com/security/cve/CVE-2020-26116 https://bugs.python.org/issue39603 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116 https://errata.almalinux.org/8/ALSA-2021-1879.html https://linux.oracle.com/cve/CVE-2020-26116.html https://linux.oracle.com/errata/ELSA-2021-1879.html https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BW4GCLQISJCOEGQNIMVUZDQMIY6RR6CC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDQ2THWU4GPV4Y5H5WW5PFMSWXL2CRFD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWMAVY4T4257AZHTF2RZJKNJNSJFY24O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OXI72HIHMXCQFWTULUXDG7VDA2BCYL4Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QOX7DGMMWWL6POCRYGAUCISOLR2IG3XV/ https://nvd.nist.gov/vuln/detail/CVE-2020-26116 https://python-security.readthedocs.io/vuln/http-header-injection-method.html https://security.gentoo.org/glsa/202101-18 https://security.netapp.com/advisory/ntap-20201023-0001/ https://ubuntu.com/security/notices/USN-4581-1 https://ubuntu.com/security/notices/USN-4754-3 https://usn.ubuntu.com/4581-1/ https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python-libs | CVE-2020-27619 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2020-27619 https://bugs.python.org/issue41944 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27619 https://errata.almalinux.org/8/ALSA-2021-4162.html https://github.com/python/cpython/commit/2ef5caa58febc8968e670e39e3d37cf8eef3cab8 https://github.com/python/cpython/commit/43e523103886af66d6c27cd72431b5d9d14cd2a9 https://github.com/python/cpython/commit/6c6c256df3636ff6f6136820afaefa5a10a3ac33 https://github.com/python/cpython/commit/b664a1df4ee71d3760ab937653b10997081b1794 https://github.com/python/cpython/commit/e912e945f2960029d039d3390ea08835ad39374b https://linux.oracle.com/cve/CVE-2020-27619.html https://linux.oracle.com/errata/ELSA-2021-4151.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://nvd.nist.gov/vuln/detail/CVE-2020-27619 https://security.netapp.com/advisory/ntap-20201123-0004/ https://ubuntu.com/security/notices/USN-4754-1 https://ubuntu.com/security/notices/USN-4754-3
|
| python-libs | CVE-2020-8492 | MEDIUM | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html https://access.redhat.com/security/cve/CVE-2020-8492 https://bugs.python.org/issue39503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492 https://errata.almalinux.org/8/ALSA-2020-4641.html https://github.com/python/cpython/commit/0b297d4ff1c0e4480ad33acae793fbaf4bf015b4 https://github.com/python/cpython/pull/18284 https://linux.oracle.com/cve/CVE-2020-8492.html https://linux.oracle.com/errata/ELSA-2020-4641.html https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E https://lists.debian.org/debian-lts-announce/2020/07/msg00011.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WOKDEXLYW5UQ4S7PA7E37IITOC7C56J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5NSAX4SC3V64PGZUPH7PRDLSON34Q5A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APGWEMYZIY5VHLCSZ3HD67PA5Z2UQFGH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UESGYI5XDAHJBATEZN3MHNDUBDH47AS6/ https://python-security.readthedocs.io/vuln/urllib-basic-auth-regex.html https://security.gentoo.org/glsa/202005-09 https://security.netapp.com/advisory/ntap-20200221-0001/ https://ubuntu.com/security/notices/USN-4333-1 https://ubuntu.com/security/notices/USN-4333-2 https://ubuntu.com/security/notices/USN-4754-3 https://ubuntu.com/security/notices/USN-5200-1 https://usn.ubuntu.com/4333-1/ https://usn.ubuntu.com/4333-2/
|
| python-libs | CVE-2021-23336 | MEDIUM | 2.7.5-86.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/02/19/4 http://www.openwall.com/lists/oss-security/2021/05/01/2 https://access.redhat.com/security/cve/CVE-2021-23336 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23336 https://errata.almalinux.org/8/ALSA-2021-4162.html https://github.com/python/cpython/commit/fcbe0cb04d35189401c0c880ebfb4311e952d776 (master) https://github.com/python/cpython/pull/24297 https://linux.oracle.com/cve/CVE-2021-23336.html https://linux.oracle.com/errata/ELSA-2021-4162.html https://lists.apache.org/thread.html/ra8ce70088ba291f358e077cafdb14d174b7a1ce9a9d86d1b332d6367@%3Cusers.airflow.apache.org%3E https://lists.apache.org/thread.html/rc005f4de9d9b0ba943ceb8ff5a21a5c6ff8a9df52632476698d99432@%3Cannounce.apache.org%3E https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/02/msg00030.html https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2021/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EPYWWFDV22CJ5AOH5VCE72DOASZZ255/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YKKDLXL3UEZ3J426C2XTBS63AHE46SM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46N6A52EGSXHJYCZWVMBJJIH4NWIV2B5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZTM7KLHFCE3LWSEVO2NAFLUHMGYMCRY/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHQDU7NXA7EWAE4W7VO6MURVJIULEPPR/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJXCMHLY7H3FIYLE4OKDYUILU2CCRUCZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVNH6Z24IG3E67ZCQGGJ46FZB4XFLQNZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MNUN5SOMFL2BBKP6ZAICIIUPQKZDMGYO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6VXJZSZ6N64AILJX4CTMACYGQGHHD5C/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJSCSN722JO2E2AGPWD4NTGVELVRPB4R/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OAGSWNGZJ6HQ5ISA67SNMK3CJRKICET7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFTELUMWZE3KV3JB2H5EE6VFRZFRD5MV/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W2LSKBEFI5SYEY5FM6ICZVZM5WRQUCS4/ https://nvd.nist.gov/vuln/detail/CVE-2021-23336 https://security.gentoo.org/glsa/202104-04 https://security.netapp.com/advisory/ntap-20210326-0004/ https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/ https://snyk.io/vuln/SNYK-UPSTREAM-PYTHONCPYTHON-1074933 https://ubuntu.com/security/notices/USN-4742-1 https://www.djangoproject.com/weblog/2021/feb/19/security-releases/ https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python-libs | CVE-2021-3177 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3177 https://bugs.python.org/issue42938 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177 https://errata.almalinux.org/8/ALSA-2021-1879.html https://github.com/python/cpython/pull/24239 https://linux.oracle.com/cve/CVE-2021-3177.html https://linux.oracle.com/errata/ELSA-2021-9130.html https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E https://lists.debian.org/debian-lts-announce/2021/04/msg00005.html https://lists.debian.org/debian-lts-announce/2022/02/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHOCQYX3QLDGDQGTWQAUUT2GGIZCZUO/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCFZMVRQUKCBQIG5F2CBVADK63NFSE4A/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FONHJIOZOFD7CD35KZL6SVBUTMBPGZGA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FPE7SMXYUIWPOIZV4DQYXODRXMFX3C5E/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCQTCSP6SCVIYNIRUJC5X7YBVUHPLSC4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MGSV6BJQLRQ6RKVUXK7JGU7TP4QFGQXC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MP572OLHMS7MZO4KUPSCIMSZIA5IZZ62/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NODWHDIFBQE5RU5PUWUVE47JOT5VCMJ2/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQPARTLNSFQVMMQHPNBFOCOZOO3TMQNA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXSMBHES3ANXXS2RSO5G6Q24BR4B2PWK/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6XJAULOS5JVB2L67NCKKMJ5NTKZJBSD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4KSYYWMGAKOA2JVCQA422OINT6CKQ7O/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDTZVGSXQ7HR7OCGSUHTRNTMBG43OMKU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z7GZV74KM72O2PEJN2C4XP3V5Q5MZUOO/ https://news.ycombinator.com/item?id=26185005 https://nvd.nist.gov/vuln/detail/CVE-2021-3177 https://python-security.readthedocs.io/vuln/ctypes-buffer-overflow-pycarg_repr.html https://security.gentoo.org/glsa/202101-18 https://security.netapp.com/advisory/ntap-20210226-0003/ https://ubuntu.com/security/notices/USN-4754-1 https://ubuntu.com/security/notices/USN-4754-2 (regression in python2.7) https://ubuntu.com/security/notices/USN-4754-3 https://ubuntu.com/security/notices/USN-4754-4 https://ubuntu.com/security/notices/USN-4754-5 https://www.oracle.com//security-alerts/cpujul2021.html https://www.oracle.com/security-alerts/cpujan2022.html https://www.oracle.com/security-alerts/cpuoct2021.html
|
| python-libs | CVE-2021-3733 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3733 https://bugs.python.org/issue43075 https://bugzilla.redhat.com/show_bug.cgi?id=1995234 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733 https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-14-final https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-11-final https://docs.python.org/3.8/whatsnew/changelog.html#python-3-8-10-final https://docs.python.org/3.9/whatsnew/changelog.html#python-3-9-5-final https://errata.almalinux.org/8/ALSA-2022-1821.html https://github.com/python/cpython/commit/3fbe96123aeb66664fa547a8f6022efa2dc8788f (3.6.14) https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb https://github.com/python/cpython/commit/7215d1ae25525c92b026166f9d5cac85fb1defe1 (master) https://github.com/python/cpython/commit/a21d4fbd549ec9685068a113660553d7f80d9b09 (3.9.5) https://github.com/python/cpython/commit/ada14995870abddc277addf57dd690a2af04c2da (3.7.11) https://github.com/python/cpython/commit/e7654b6046090914a8323931ed759a94a5f85d60 (3.8.10) https://github.com/python/cpython/pull/24391 https://linux.oracle.com/cve/CVE-2021-3733.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://nvd.nist.gov/vuln/detail/CVE-2021-3733 https://security.netapp.com/advisory/ntap-20220407-0001/ https://ubuntu.com/security/CVE-2021-3733 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1
|
| python-libs | CVE-2021-4189 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4189 https://bugs.python.org/issue43285 https://bugzilla.redhat.com/show_bug.cgi?id=2036020 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0ab152c6b5d95caa2dc1a30fa96e10258b5f188e (master) https://github.com/python/cpython/commit/4134f154ae2f621f25c5d698cc0f1748035a1b88 (v3.6.14) https://github.com/python/cpython/commit/79373951b3eab585d42e0f0ab83718cbe1d0ee33 (v3.7.11) https://github.com/python/cpython/commit/7dcb4baa4f0fde3aef5122a8e9f6a41853ec9335 (v3.9.3) https://linux.oracle.com/cve/CVE-2021-4189.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://ubuntu.com/security/notices/USN-5342-1
|
| python-libs | CVE-2022-0391 | MEDIUM | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0391 https://bugs.python.org/issue43882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391 https://errata.almalinux.org/8/ALSA-2022-1821.html https://linux.oracle.com/cve/CVE-2022-0391.html https://linux.oracle.com/errata/ELSA-2022-1821.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSD2YBXP3ZF44E44QMIIAR5VTO35KTRB/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UDBDBAU6HUPZHISBOARTXZ5GKHF2VH5U/ https://nvd.nist.gov/vuln/detail/CVE-2022-0391 https://security.netapp.com/advisory/ntap-20220225-0009/ https://ubuntu.com/security/notices/USN-5342-1 https://www.oracle.com/security-alerts/cpuapr2022.html
|
| python-libs | CVE-2018-1000030 | LOW | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-1000030 https://bugs.python.org/issue31530 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000030 https://drive.google.com/file/d/1oyR9DAZjZK_SCn3mor6NRAYLJS6ueXaY/view https://security.gentoo.org/glsa/201811-02 https://ubuntu.com/security/notices/USN-3817-1 https://ubuntu.com/security/notices/USN-3817-2 https://usn.ubuntu.com/3817-1/ https://usn.ubuntu.com/3817-2/ https://www.dropbox.com/sh/sj3ee7xv55j36k7/AADwP-YfOYikBMuy32e0uvPFa?dl=0 https://www.oracle.com/security-alerts/cpujan2020.html
|
| python-libs | CVE-2019-9674 | LOW | 2.7.5-86.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00041.html https://access.redhat.com/security/cve/CVE-2019-9674 https://bugs.python.org/issue36260 https://bugs.python.org/issue36462 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9674 https://github.com/python/cpython/blob/master/Lib/zipfile.py https://nvd.nist.gov/vuln/detail/CVE-2019-9674 https://python-security.readthedocs.io/security.html#archives-and-zip-bomb https://security.netapp.com/advisory/ntap-20200221-0003/ https://ubuntu.com/security/notices/USN-4428-1 https://ubuntu.com/security/notices/USN-4754-3 https://usn.ubuntu.com/4428-1/ https://www.python.org/news/security/
|
| python-libs | CVE-2021-3737 | LOW | 2.7.5-86.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3737 https://bugs.python.org/issue44022 https://bugzilla.redhat.com/show_bug.cgi?id=1995162 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737 https://errata.almalinux.org/8/ALSA-2022-1986.html https://github.com/python/cpython/commit/0389426fa4af4dfc8b1d7f3f291932d928392d8b (3.8 branch) https://github.com/python/cpython/commit/078b146f062d212919d0ba25e34e658a8234aa63 (v3.7.11) https://github.com/python/cpython/commit/1b6f4e5e13ebd1f957b47f7415b53d0869bdbac6 (v3.6.14 https://github.com/python/cpython/commit/5df4abd6b033a5f1e48945c6988b45e35e76f647 (v3.9.6) https://github.com/python/cpython/commit/60ba0b68470a584103e28958d91e93a6db37ec92 (v3.10.0b2) https://github.com/python/cpython/commit/98e5a7975d99b58d511f171816ecdfb13d5cca18 (v3.10.0b3) https://github.com/python/cpython/commit/ea9327036680acc92d9f89eaf6f6a54d2f8d78d9 (v3.9.6) https://github.com/python/cpython/commit/f396864ddfe914531b5856d7bf852808ebfc01ae (v3.8.11) https://github.com/python/cpython/commit/f68d2d69f1da56c2aea1293ecf93ab69a6010ad7 (v3.6.14) https://github.com/python/cpython/commit/fee96422e6f0056561cf74fef2012cc066c9db86 (v3.7.11) https://github.com/python/cpython/pull/25916 https://github.com/python/cpython/pull/26503 https://linux.oracle.com/cve/CVE-2021-3737.html https://linux.oracle.com/errata/ELSA-2022-1986.html https://nvd.nist.gov/vuln/detail/CVE-2021-3737 https://python-security.readthedocs.io/vuln/urllib-100-continue-loop.html https://security.netapp.com/advisory/ntap-20220407-0009/ https://ubuntu.com/security/CVE-2021-3737 https://ubuntu.com/security/notices/USN-5083-1 https://ubuntu.com/security/notices/USN-5199-1 https://ubuntu.com/security/notices/USN-5200-1 https://ubuntu.com/security/notices/USN-5201-1
|
| readline | CVE-2016-7091 | LOW | 6.2-11.el7 | | Expand...http://www.securityfocus.com/bid/92615 https://access.redhat.com/security/cve/CVE-2016-7091 https://linux.oracle.com/cve/CVE-2016-7091.html https://linux.oracle.com/errata/ELSA-2016-2593.html https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html https://rhn.redhat.com/errata/RHSA-2016-2593.html
|
| rpm | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7500 https://bugzilla.redhat.com/show_bug.cgi?id=1450369 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500 https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9 https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
|
| rpm | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7501 https://bugzilla.redhat.com/show_bug.cgi?id=1452133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501 https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201811-22
|
| rpm | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-20271 https://bugzilla.redhat.com/show_bug.cgi?id=1934125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://linux.oracle.com/cve/CVE-2021-20271.html https://linux.oracle.com/errata/ELSA-2021-4785.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-20271 https://security.gentoo.org/glsa/202107-43
|
| rpm | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-3421 https://bugzilla.redhat.com/show_bug.cgi?id=1927747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-3421 https://security.gentoo.org/glsa/202107-43
|
| rpm | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json https://access.redhat.com/security/cve/CVE-2021-3521 https://linux.oracle.com/cve/CVE-2021-3521.html https://linux.oracle.com/errata/ELSA-2022-0368.html
|
| rpm | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35937
|
| rpm | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35938
|
| rpm | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35939
|
| rpm | CVE-2021-20266 | LOW | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20266 https://bugzilla.redhat.com/show_bug.cgi?id=1927741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266 https://github.com/rpm-software-management/rpm/pull/1500 https://linux.oracle.com/cve/CVE-2021-20266.html https://linux.oracle.com/errata/ELSA-2021-4489.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://nvd.nist.gov/vuln/detail/CVE-2021-20266 https://security.gentoo.org/glsa/202107-43
|
| rpm-build-libs | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7500 https://bugzilla.redhat.com/show_bug.cgi?id=1450369 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500 https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9 https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
|
| rpm-build-libs | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7501 https://bugzilla.redhat.com/show_bug.cgi?id=1452133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501 https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201811-22
|
| rpm-build-libs | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-20271 https://bugzilla.redhat.com/show_bug.cgi?id=1934125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://linux.oracle.com/cve/CVE-2021-20271.html https://linux.oracle.com/errata/ELSA-2021-4785.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-20271 https://security.gentoo.org/glsa/202107-43
|
| rpm-build-libs | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-3421 https://bugzilla.redhat.com/show_bug.cgi?id=1927747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-3421 https://security.gentoo.org/glsa/202107-43
|
| rpm-build-libs | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json https://access.redhat.com/security/cve/CVE-2021-3521 https://linux.oracle.com/cve/CVE-2021-3521.html https://linux.oracle.com/errata/ELSA-2022-0368.html
|
| rpm-build-libs | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35937
|
| rpm-build-libs | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35938
|
| rpm-build-libs | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35939
|
| rpm-build-libs | CVE-2021-20266 | LOW | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20266 https://bugzilla.redhat.com/show_bug.cgi?id=1927741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266 https://github.com/rpm-software-management/rpm/pull/1500 https://linux.oracle.com/cve/CVE-2021-20266.html https://linux.oracle.com/errata/ELSA-2021-4489.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://nvd.nist.gov/vuln/detail/CVE-2021-20266 https://security.gentoo.org/glsa/202107-43
|
| rpm-libs | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7500 https://bugzilla.redhat.com/show_bug.cgi?id=1450369 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500 https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9 https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
|
| rpm-libs | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7501 https://bugzilla.redhat.com/show_bug.cgi?id=1452133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501 https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201811-22
|
| rpm-libs | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-20271 https://bugzilla.redhat.com/show_bug.cgi?id=1934125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://linux.oracle.com/cve/CVE-2021-20271.html https://linux.oracle.com/errata/ELSA-2021-4785.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-20271 https://security.gentoo.org/glsa/202107-43
|
| rpm-libs | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-3421 https://bugzilla.redhat.com/show_bug.cgi?id=1927747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-3421 https://security.gentoo.org/glsa/202107-43
|
| rpm-libs | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json https://access.redhat.com/security/cve/CVE-2021-3521 https://linux.oracle.com/cve/CVE-2021-3521.html https://linux.oracle.com/errata/ELSA-2022-0368.html
|
| rpm-libs | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35937
|
| rpm-libs | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35938
|
| rpm-libs | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35939
|
| rpm-libs | CVE-2021-20266 | LOW | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20266 https://bugzilla.redhat.com/show_bug.cgi?id=1927741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266 https://github.com/rpm-software-management/rpm/pull/1500 https://linux.oracle.com/cve/CVE-2021-20266.html https://linux.oracle.com/errata/ELSA-2021-4489.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://nvd.nist.gov/vuln/detail/CVE-2021-20266 https://security.gentoo.org/glsa/202107-43
|
| rpm-python | CVE-2017-7500 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7500 https://bugzilla.redhat.com/show_bug.cgi?id=1450369 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7500 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7500 https://github.com/rpm-software-management/rpm/commit/c815822c8bdb138066ff58c624ae83e3a12ebfa9 https://github.com/rpm-software-management/rpm/commit/f2d3be2a8741234faaa96f5fd05fdfdc75779a79
|
| rpm-python | CVE-2017-7501 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-7501 https://bugzilla.redhat.com/show_bug.cgi?id=1452133 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7501 https://github.com/rpm-software-management/rpm/commit/404ef011c300207cdb1e531670384564aae04bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201811-22
|
| rpm-python | CVE-2021-20271 | MEDIUM | 4.11.3-40.el7 | 4.11.3-48.el7_9 | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-20271 https://bugzilla.redhat.com/show_bug.cgi?id=1934125 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://linux.oracle.com/cve/CVE-2021-20271.html https://linux.oracle.com/errata/ELSA-2021-4785.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-20271 https://security.gentoo.org/glsa/202107-43
|
| rpm-python | CVE-2021-3421 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20271.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3421.json https://access.redhat.com/security/cve/CVE-2021-3421 https://bugzilla.redhat.com/show_bug.cgi?id=1927747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3421 https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/ https://nvd.nist.gov/vuln/detail/CVE-2021-3421 https://security.gentoo.org/glsa/202107-43
|
| rpm-python | CVE-2021-3521 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3521.json https://access.redhat.com/security/cve/CVE-2021-3521 https://linux.oracle.com/cve/CVE-2021-3521.html https://linux.oracle.com/errata/ELSA-2022-0368.html
|
| rpm-python | CVE-2021-35937 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35937
|
| rpm-python | CVE-2021-35938 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35938
|
| rpm-python | CVE-2021-35939 | MEDIUM | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-35939
|
| rpm-python | CVE-2021-20266 | LOW | 4.11.3-40.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20266 https://bugzilla.redhat.com/show_bug.cgi?id=1927741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20266 https://github.com/rpm-software-management/rpm/pull/1500 https://linux.oracle.com/cve/CVE-2021-20266.html https://linux.oracle.com/errata/ELSA-2021-4489.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/ https://nvd.nist.gov/vuln/detail/CVE-2021-20266 https://security.gentoo.org/glsa/202107-43
|
| rsync | CVE-2014-9512 | MEDIUM | 3.1.2-10.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-02/msg00041.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00095.html http://lists.opensuse.org/opensuse-updates/2016-06/msg00112.html http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html http://www.securityfocus.com/bid/76093 http://www.securitytracker.com/id/1034786 http://www.ubuntu.com/usn/USN-2879-1 http://xteam.baidu.com/?p=169 https://access.redhat.com/security/cve/CVE-2014-9512 https://bugzilla.samba.org/show_bug.cgi?id=10977 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512 https://security.gentoo.org/glsa/201605-04 https://support.apple.com/kb/HT211168 https://support.apple.com/kb/HT211170 https://support.apple.com/kb/HT211171 https://support.apple.com/kb/HT211175 https://support.apple.com/kb/HT211289 https://ubuntu.com/security/notices/USN-2879-1
|
| rsync | CVE-2017-15994 | MEDIUM | 3.1.2-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-15994 https://git.samba.org/?p=rsync.git;a=commit;h=7b8a4ecd6ff9cdf4e5d3850ebf822f1e989255b3 https://git.samba.org/?p=rsync.git;a=commit;h=9a480deec4d20277d8e20bc55515ef0640ca1e55 https://git.samba.org/?p=rsync.git;a=commit;h=c252546ceeb0925eb8a4061315e3ff0a8c55b48b
|
| rsync | CVE-2017-16548 | MEDIUM | 3.1.2-10.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-16548 https://bugzilla.samba.org/show_bug.cgi?id=13112 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16548 https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=47a63d90e71d3e19e0e96052bb8c6b9cb140ecc1 https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html https://ubuntu.com/security/notices/USN-3543-1 https://ubuntu.com/security/notices/USN-3543-2 https://usn.ubuntu.com/3543-1/ https://usn.ubuntu.com/3543-2/ https://www.debian.org/security/2017/dsa-4068
|
| rsync | CVE-2017-17433 | MEDIUM | 3.1.2-10.el7 | | Expand...http://security.cucumberlinux.com/security/details.php?id=169 https://access.redhat.com/security/cve/CVE-2017-17433 https://bugzilla.redhat.com/show_bug.cgi?id=1522874#c4 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17433 https://git.samba.org/?p=rsync.git;a=commit;h=3e06d40029cfdce9d0f73d87cfd4edaf54be9c51 https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html https://ubuntu.com/security/notices/USN-3506-1 https://ubuntu.com/security/notices/USN-3506-2 https://www.debian.org/security/2017/dsa-4068
|
| rsync | CVE-2017-17434 | MEDIUM | 3.1.2-10.el7 | | Expand...http://security.cucumberlinux.com/security/details.php?id=170 https://access.redhat.com/security/cve/CVE-2017-17434 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17434 https://git.samba.org/?p=rsync.git;a=commit;h=5509597decdbd7b91994210f700329d8a35e70a1 https://git.samba.org/?p=rsync.git;a=commit;h=70aeb5fddd1b2f8e143276f8d5a085db16c593b9 https://lists.debian.org/debian-lts-announce/2017/12/msg00020.html https://ubuntu.com/security/notices/USN-3506-1 https://ubuntu.com/security/notices/USN-3506-2 https://www.debian.org/security/2017/dsa-4068
|
| rsync | CVE-2018-5764 | MEDIUM | 3.1.2-10.el7 | | Expand...http://www.securityfocus.com/bid/102803 http://www.securitytracker.com/id/1040276 https://access.redhat.com/security/cve/CVE-2018-5764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5764 https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS https://git.samba.org/rsync.git/?p=rsync.git;a=commit;h=7706303828fcde524222babb2833864a4bd09e07 https://lists.debian.org/debian-lts-announce/2018/01/msg00021.html https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html https://lists.debian.org/debian-lts-announce/2021/11/msg00028.html https://security.gentoo.org/glsa/201805-04 https://ubuntu.com/security/notices/USN-3543-1 https://ubuntu.com/security/notices/USN-3543-2 https://usn.ubuntu.com/3543-1/
|
| shared-mime-info | CVE-2019-3820 | MEDIUM | 1.8-4.el7 | 1.8-5.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html https://access.redhat.com/security/cve/CVE-2019-3820 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820 https://gitlab.gnome.org/GNOME/gnome-shell/issues/851 https://linux.oracle.com/cve/CVE-2019-3820.html https://linux.oracle.com/errata/ELSA-2020-1021.html https://ubuntu.com/security/notices/USN-3966-1 https://usn.ubuntu.com/3966-1/
|
| sqlite | CVE-2019-13734 | HIGH | 3.7.17-8.el7 | 3.7.17-8.el7_7.1 | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html https://access.redhat.com/errata/RHSA-2019:4238 https://access.redhat.com/errata/RHSA-2020:0227 https://access.redhat.com/errata/RHSA-2020:0229 https://access.redhat.com/errata/RHSA-2020:0273 https://access.redhat.com/errata/RHSA-2020:0451 https://access.redhat.com/errata/RHSA-2020:0463 https://access.redhat.com/errata/RHSA-2020:0476 https://access.redhat.com/security/cve/CVE-2019-13734 https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html https://crbug.com/1025466 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13734 https://linux.oracle.com/cve/CVE-2019-13734.html https://linux.oracle.com/errata/ELSA-2020-0273.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/ https://seclists.org/bugtraq/2020/Jan/27 https://security.gentoo.org/glsa/202003-08 https://ubuntu.com/security/notices/USN-4298-1 https://ubuntu.com/security/notices/USN-4298-2 https://usn.ubuntu.com/4298-1/ https://usn.ubuntu.com/4298-2/ https://www.debian.org/security/2020/dsa-4606 https://www.oracle.com/security-alerts/cpujan2022.html
|
| sqlite | CVE-2015-7036 | MEDIUM | 3.7.17-8.el7 | | Expand...http://support.apple.com/kb/HT204941 http://support.apple.com/kb/HT204942 http://zerodayinitiative.com/advisories/ZDI-15-570/ https://access.redhat.com/security/cve/CVE-2015-7036 https://security.gentoo.org/glsa/201612-21
|
| sqlite | CVE-2017-7000 | MEDIUM | 3.7.17-8.el7 | | Expand...http://www.securityfocus.com/bid/98767 http://www.securityfocus.com/bid/99950 https://access.redhat.com/errata/RHSA-2017:1833 https://access.redhat.com/security/cve/CVE-2017-7000 https://chromereleases.googleblog.com/2017/07/stable-channel-update-for-desktop.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7000 https://security.gentoo.org/glsa/201709-15 https://support.apple.com/HT207797 https://support.apple.com/HT207798 https://www.debian.org/security/2017/dsa-3926 https://www.sqlite.org/bindptr.html
|
| sqlite | CVE-2019-13751 | MEDIUM | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html https://access.redhat.com/errata/RHSA-2019:4238 https://access.redhat.com/security/cve/CVE-2019-13751 https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html https://crbug.com/1025465 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13751 https://linux.oracle.com/cve/CVE-2019-13751.html https://linux.oracle.com/errata/ELSA-2021-4396.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/ https://seclists.org/bugtraq/2020/Jan/27 https://security.gentoo.org/glsa/202003-08 https://ubuntu.com/security/notices/USN-4298-1 https://ubuntu.com/security/notices/USN-4298-2 https://usn.ubuntu.com/4298-1/ https://usn.ubuntu.com/4298-2/ https://www.debian.org/security/2020/dsa-4606
|
| sqlite | CVE-2019-13752 | MEDIUM | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html https://access.redhat.com/errata/RHSA-2019:4238 https://access.redhat.com/security/cve/CVE-2019-13752 https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html https://crbug.com/1025470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13752 https://linux.oracle.com/cve/CVE-2019-13752.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/ https://seclists.org/bugtraq/2020/Jan/27 https://security.gentoo.org/glsa/202003-08 https://ubuntu.com/security/notices/USN-4298-1 https://ubuntu.com/security/notices/USN-4298-2 https://usn.ubuntu.com/4298-1/ https://usn.ubuntu.com/4298-2/ https://www.debian.org/security/2020/dsa-4606
|
| sqlite | CVE-2019-13753 | MEDIUM | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00032.html http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00036.html https://access.redhat.com/errata/RHSA-2019:4238 https://access.redhat.com/security/cve/CVE-2019-13753 https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html https://crbug.com/1025471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13753 https://linux.oracle.com/cve/CVE-2019-13753.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2Z5M4FPUMDNX2LDPHJKN5ZV5GIS2AKNU/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N5CIQCVS6E3ULJCNU7YJXJPO2BLQZDTK/ https://seclists.org/bugtraq/2020/Jan/27 https://security.gentoo.org/glsa/202003-08 https://ubuntu.com/security/notices/USN-4298-1 https://ubuntu.com/security/notices/USN-4298-2 https://usn.ubuntu.com/4298-1/ https://usn.ubuntu.com/4298-2/ https://www.debian.org/security/2020/dsa-4606
|
| sqlite | CVE-2019-19603 | MEDIUM | 3.7.17-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19603 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603 https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13 https://linux.oracle.com/cve/CVE-2019-19603.html https://linux.oracle.com/errata/ELSA-2021-4396.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://security.netapp.com/advisory/ntap-20191223-0001/ https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4394-1/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.sqlite.org/
|
| sqlite | CVE-2019-19645 | MEDIUM | 3.7.17-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19645 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19645 https://github.com/sqlite/sqlite/commit/38096961c7cd109110ac21d3ed7dad7e0cb0ae06 https://security.netapp.com/advisory/ntap-20191223-0001/ https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4394-1/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.tenable.com/security/tns-2021-14
|
| sqlite | CVE-2019-19880 | MEDIUM | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html https://access.redhat.com/errata/RHSA-2020:0514 https://access.redhat.com/security/cve/CVE-2019-19880 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19880 https://github.com/sqlite/sqlite/commit/75e95e1fcd52d3ec8282edb75ac8cd0814095d54 https://security.netapp.com/advisory/ntap-20200114-0001/ https://ubuntu.com/security/notices/USN-4298-1 https://usn.ubuntu.com/4298-1/ https://www.debian.org/security/2020/dsa-4638 https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite | CVE-2019-19924 | MEDIUM | 3.7.17-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19924 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19924 https://github.com/sqlite/sqlite/commit/8654186b0236d556aa85528c2573ee0b6ab71be3 https://linux.oracle.com/cve/CVE-2019-19924.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.netapp.com/advisory/ntap-20200114-0003/ https://ubuntu.com/security/notices/USN-4298-1 https://usn.ubuntu.com/4298-1/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite | CVE-2019-20218 | MEDIUM | 3.7.17-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-20218 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20218 https://github.com/sqlite/sqlite/commit/a6c1a71cde082e09750465d5675699062922e387 https://linux.oracle.com/cve/CVE-2019-20218.html https://linux.oracle.com/errata/ELSA-2020-4442.html https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html https://lists.debian.org/debian-lts-announce/2020/12/msg00016.html https://security.gentoo.org/glsa/202007-26 https://ubuntu.com/security/notices/USN-4298-1 https://usn.ubuntu.com/4298-1/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite | CVE-2019-5827 | MEDIUM | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00085.html https://access.redhat.com/security/cve/CVE-2019-5827 https://chromereleases.googleblog.com/2019/04/stable-channel-update-for-desktop_30.html https://crbug.com/952406 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827 https://linux.oracle.com/cve/CVE-2019-5827.html https://linux.oracle.com/errata/ELSA-2021-4396.html https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CPM7VPE27DUNJLXM4F5PAAEFFWOEND6X/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKN4GPMBQ3SDXWB4HL45II5CZ7P2E4AI/ https://seclists.org/bugtraq/2019/Aug/19 https://security.gentoo.org/glsa/202003-16 https://ubuntu.com/security/notices/USN-4205-1 https://usn.ubuntu.com/4205-1/ https://www.debian.org/security/2019/dsa-4500
|
| sqlite | CVE-2019-8457 | MEDIUM | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00074.html https://access.redhat.com/security/cve/CVE-2019-8457 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8457 https://kc.mcafee.com/corporate/index?page=content&id=SB10365 https://linux.oracle.com/cve/CVE-2019-8457.html https://linux.oracle.com/errata/ELSA-2020-1810.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPKYSWCOM3CL66RI76TYVIG6TJ263RXH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJPFGA45DI4F5MCF2OAACGH3HQOF4G3M/ https://security.netapp.com/advisory/ntap-20190606-0002/ https://ubuntu.com/security/notices/USN-4004-1 https://ubuntu.com/security/notices/USN-4004-2 https://ubuntu.com/security/notices/USN-4019-1 https://ubuntu.com/security/notices/USN-4019-2 https://usn.ubuntu.com/4004-1/ https://usn.ubuntu.com/4004-2/ https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/ https://www.oracle.com/security-alerts/cpuapr2020.html https://www.oracle.com/security-alerts/cpujan2020.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html https://www.sqlite.org/releaselog/3_28_0.html https://www.sqlite.org/src/info/90acdbfce9c08858
|
| sqlite | CVE-2020-13435 | MEDIUM | 3.7.17-8.el7 | | Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2020/Nov/19 http://seclists.org/fulldisclosure/2020/Nov/20 http://seclists.org/fulldisclosure/2020/Nov/22 https://access.redhat.com/security/cve/CVE-2020-13435 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13435 https://linux.oracle.com/cve/CVE-2020-13435.html https://linux.oracle.com/errata/ELSA-2021-4396.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/ https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc https://security.gentoo.org/glsa/202007-26 https://security.netapp.com/advisory/ntap-20200528-0004/ https://support.apple.com/kb/HT211843 https://support.apple.com/kb/HT211844 https://support.apple.com/kb/HT211850 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT211935 https://support.apple.com/kb/HT211952 https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4394-1/ https://www.oracle.com/security-alerts/cpuApr2021.html https://www.oracle.com/security-alerts/cpujul2020.html https://www.sqlite.org/src/info/7a5279a25c57adf1
|
| sqlite | CVE-2020-13631 | MEDIUM | 3.7.17-8.el7 | | Expand...http://seclists.org/fulldisclosure/2020/Dec/32 http://seclists.org/fulldisclosure/2020/Nov/19 http://seclists.org/fulldisclosure/2020/Nov/20 http://seclists.org/fulldisclosure/2020/Nov/22 https://access.redhat.com/security/cve/CVE-2020-13631 https://bugs.chromium.org/p/chromium/issues/detail?id=1080459 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13631 https://linux.oracle.com/cve/CVE-2020-13631.html https://linux.oracle.com/errata/ELSA-2020-4442.html https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7KXQWHIY2MQP4LNM6ODWJENMXYYQYBN/ https://security.FreeBSD.org/advisories/FreeBSD-SA-20:22.sqlite.asc https://security.gentoo.org/glsa/202007-26 https://security.netapp.com/advisory/ntap-20200608-0002/ https://sqlite.org/src/info/eca0ba2cf4c0fdf7 https://support.apple.com/kb/HT211843 https://support.apple.com/kb/HT211844 https://support.apple.com/kb/HT211850 https://support.apple.com/kb/HT211931 https://support.apple.com/kb/HT211935 https://support.apple.com/kb/HT211952 https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4394-1/ https://www.oracle.com/security-alerts/cpujul2020.html https://www.oracle.com/security-alerts/cpuoct2020.html
|
| sqlite | CVE-2016-6153 | LOW | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2016-08/msg00053.html http://www.openwall.com/lists/oss-security/2016/07/01/1 http://www.openwall.com/lists/oss-security/2016/07/01/2 http://www.securityfocus.com/bid/91546 http://www.sqlite.org/cgi/src/info/67985761aa93fb61 https://access.redhat.com/security/cve/CVE-2016-6153 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IGQTH7V45QVHFDXJAEECHEO3HHD644WZ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/ https://ubuntu.com/security/notices/USN-4019-1 https://ubuntu.com/security/notices/USN-4019-2 https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/ https://www.korelogic.com/Resources/Advisories/KL-001-2016-003.txt https://www.sqlite.org/releaselog/3_13_0.html https://www.tenable.com/security/tns-2016-20
|
| sqlite | CVE-2017-10989 | LOW | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html http://marc.info/?l=sqlite-users&m=149933696214713&w=2 http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html http://www.securityfocus.com/bid/99502 http://www.securitytracker.com/id/1039427 https://access.redhat.com/security/cve/CVE-2017-10989 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=2405 https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1700937 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10989 https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html https://sqlite.org/src/info/66de6f4a https://sqlite.org/src/vpatch?from=0db20efe201736b3&to=66de6f4a9504ec26 https://support.apple.com/HT208112 https://support.apple.com/HT208113 https://support.apple.com/HT208115 https://support.apple.com/HT208144 https://ubuntu.com/security/notices/USN-4019-1 https://ubuntu.com/security/notices/USN-4019-2 https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/
|
| sqlite | CVE-2017-13685 | LOW | 3.7.17-8.el7 | | Expand...http://www.mail-archive.com/sqlite-users%40mailinglists.sqlite.org/msg105314.html http://www.securityfocus.com/bid/100521 https://access.redhat.com/security/cve/CVE-2017-13685 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13685 https://ubuntu.com/security/notices/USN-4019-1 https://ubuntu.com/security/notices/USN-4019-2 https://usn.ubuntu.com/4019-1/ https://usn.ubuntu.com/4019-2/
|
| sqlite | CVE-2017-15286 | LOW | 3.7.17-8.el7 | | Expand...http://www.securityfocus.com/bid/101285 https://access.redhat.com/security/cve/CVE-2017-15286 https://github.com/Ha0Team/crash-of-sqlite3/blob/master/poc.md
|
| sqlite | CVE-2018-8740 | LOW | 3.7.17-8.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00050.html http://www.securityfocus.com/bid/103466 https://access.redhat.com/security/cve/CVE-2018-8740 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964 https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8740 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/01/msg00009.html https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PU4NZ6DDU4BEM3ACM3FM6GLEPX56ZQXK/ https://ubuntu.com/security/notices/USN-4205-1 https://ubuntu.com/security/notices/USN-4394-1 https://usn.ubuntu.com/4205-1/ https://usn.ubuntu.com/4394-1/ https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
|
| sqlite | CVE-2019-19244 | LOW | 3.7.17-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2019-19244 https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19244 https://github.com/sqlite/sqlite/commit/e59c562b3f6894f84c715772c4b116d7b5c01348 https://ubuntu.com/security/notices/USN-4205-1 https://usn.ubuntu.com/4205-1/ https://www.oracle.com/security-alerts/cpuapr2020.html
|
| sqlite | CVE-2021-45346 | LOW | 3.7.17-8.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-45346 https://github.com/guyinatuxedo/sqlite3_record_leaking https://security.netapp.com/advisory/ntap-20220303-0001/ https://sqlite.org/forum/forumpost/53de8864ba114bf6
|
| systemd | CVE-2013-4392 | MEDIUM | 219-67.el7_7.1 | | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://access.redhat.com/security/cve/CVE-2013-4392 https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
| systemd | CVE-2017-18078 | MEDIUM | 219-67.el7_7.1 | | Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html http://www.openwall.com/lists/oss-security/2018/01/29/3 https://access.redhat.com/security/cve/CVE-2017-18078 https://github.com/systemd/systemd/issues/7736 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html https://www.exploit-db.com/exploits/43935/ https://www.openwall.com/lists/oss-security/2018/01/29/4
|
| systemd | CVE-2018-6954 | MEDIUM | 219-67.el7_7.1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html https://access.redhat.com/security/cve/CVE-2018-6954 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954 https://github.com/systemd/systemd/issues/7986 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://ubuntu.com/security/notices/USN-3816-1 https://ubuntu.com/security/notices/USN-3816-2 https://usn.ubuntu.com/3816-1/ https://usn.ubuntu.com/3816-2/
|
| systemd | CVE-2019-3842 | MEDIUM | 219-67.el7_7.1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html https://access.redhat.com/security/cve/CVE-2019-3842 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842 https://linux.oracle.com/cve/CVE-2019-3842.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/ https://nvd.nist.gov/vuln/detail/CVE-2019-3842 https://ubuntu.com/security/notices/USN-3938-1 https://www.exploit-db.com/exploits/46743/
|
| systemd | CVE-2020-13529 | MEDIUM | 219-67.el7_7.1 | | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
| systemd | CVE-2020-13776 | MEDIUM | 219-67.el7_7.1 | | Expand...https://access.redhat.com/security/cve/CVE-2020-13776 https://github.com/systemd/systemd/issues/15985 https://linux.oracle.com/cve/CVE-2020-13776.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/ https://nvd.nist.gov/vuln/detail/CVE-2020-13776 https://security.netapp.com/advisory/ntap-20200611-0003/
|
| systemd | CVE-2021-3997 | MEDIUM | 219-67.el7_7.1 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| systemd | CVE-2016-6349 | LOW | 219-67.el7_7.1 | | Expand...http://www.openwall.com/lists/oss-security/2016/07/26/9 http://www.openwall.com/lists/oss-security/2016/10/13/7 http://www.securityfocus.com/bid/92143 https://access.redhat.com/security/cve/CVE-2016-6349 https://bugzilla.redhat.com/show_bug.cgi?id=1360634 https://github.com/projectatomic/oci-register-machine/pull/22
|
| systemd | CVE-2019-20386 | LOW | 219-67.el7_7.1 | 219-78.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html https://access.redhat.com/security/cve/CVE-2019-20386 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad https://linux.oracle.com/cve/CVE-2019-20386.html https://linux.oracle.com/errata/ELSA-2020-4553.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/ https://nvd.nist.gov/vuln/detail/CVE-2019-20386 https://security.netapp.com/advisory/ntap-20200210-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
| systemd-libs | CVE-2013-4392 | MEDIUM | 219-67.el7_7.1 | | Expand...http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725357 http://www.openwall.com/lists/oss-security/2013/10/01/9 https://access.redhat.com/security/cve/CVE-2013-4392 https://bugzilla.redhat.com/show_bug.cgi?id=859060
|
| systemd-libs | CVE-2017-18078 | MEDIUM | 219-67.el7_7.1 | | Expand...http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html http://www.openwall.com/lists/oss-security/2018/01/29/3 https://access.redhat.com/security/cve/CVE-2017-18078 https://github.com/systemd/systemd/issues/7736 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html https://www.exploit-db.com/exploits/43935/ https://www.openwall.com/lists/oss-security/2018/01/29/4
|
| systemd-libs | CVE-2018-6954 | MEDIUM | 219-67.el7_7.1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html https://access.redhat.com/security/cve/CVE-2018-6954 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6954 https://github.com/systemd/systemd/issues/7986 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://ubuntu.com/security/notices/USN-3816-1 https://ubuntu.com/security/notices/USN-3816-2 https://usn.ubuntu.com/3816-1/ https://usn.ubuntu.com/3816-2/
|
| systemd-libs | CVE-2019-3842 | MEDIUM | 219-67.el7_7.1 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html https://access.redhat.com/security/cve/CVE-2019-3842 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3842 https://linux.oracle.com/cve/CVE-2019-3842.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/ https://nvd.nist.gov/vuln/detail/CVE-2019-3842 https://ubuntu.com/security/notices/USN-3938-1 https://www.exploit-db.com/exploits/46743/
|
| systemd-libs | CVE-2020-13529 | MEDIUM | 219-67.el7_7.1 | | Expand...http://www.openwall.com/lists/oss-security/2021/08/04/2 http://www.openwall.com/lists/oss-security/2021/08/17/3 http://www.openwall.com/lists/oss-security/2021/09/07/3 https://access.redhat.com/security/cve/CVE-2020-13529 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13529 https://linux.oracle.com/cve/CVE-2020-13529.html https://linux.oracle.com/errata/ELSA-2021-4361.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42TMJVNYRY65B4QCJICBYOEIVZV3KUYI/ https://security.gentoo.org/glsa/202107-48 https://security.netapp.com/advisory/ntap-20210625-0005/ https://talosintelligence.com/vulnerability_reports/TALOS-2020-1142 https://ubuntu.com/security/notices/USN-5013-1 https://ubuntu.com/security/notices/USN-5013-2
|
| systemd-libs | CVE-2020-13776 | MEDIUM | 219-67.el7_7.1 | | Expand...https://access.redhat.com/security/cve/CVE-2020-13776 https://github.com/systemd/systemd/issues/15985 https://linux.oracle.com/cve/CVE-2020-13776.html https://linux.oracle.com/errata/ELSA-2021-1611.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IYGLFEKG45EYBJ7TPQMLWROWPTZBEU63/ https://nvd.nist.gov/vuln/detail/CVE-2020-13776 https://security.netapp.com/advisory/ntap-20200611-0003/
|
| systemd-libs | CVE-2021-3997 | MEDIUM | 219-67.el7_7.1 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3997 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3997 https://ubuntu.com/security/notices/USN-5226-1 https://www.openwall.com/lists/oss-security/2022/01/10/2
|
| systemd-libs | CVE-2016-6349 | LOW | 219-67.el7_7.1 | | Expand...http://www.openwall.com/lists/oss-security/2016/07/26/9 http://www.openwall.com/lists/oss-security/2016/10/13/7 http://www.securityfocus.com/bid/92143 https://access.redhat.com/security/cve/CVE-2016-6349 https://bugzilla.redhat.com/show_bug.cgi?id=1360634 https://github.com/projectatomic/oci-register-machine/pull/22
|
| systemd-libs | CVE-2019-20386 | LOW | 219-67.el7_7.1 | 219-78.el7 | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00014.html https://access.redhat.com/security/cve/CVE-2019-20386 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386 https://github.com/systemd/systemd/commit/b2774a3ae692113e1f47a336a6c09bac9cfb49ad https://linux.oracle.com/cve/CVE-2019-20386.html https://linux.oracle.com/errata/ELSA-2020-4553.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZPCOMW5X6IZZXASCDD2CNW2DLF3YADC/ https://nvd.nist.gov/vuln/detail/CVE-2019-20386 https://security.netapp.com/advisory/ntap-20200210-0002/ https://ubuntu.com/security/notices/USN-4269-1 https://usn.ubuntu.com/4269-1/
|
| tar | CVE-2005-2541 | MEDIUM | 2:1.26-35.el7 | | Expand...http://marc.info/?l=bugtraq&m=112327628230258&w=2 https://access.redhat.com/security/cve/CVE-2005-2541 https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c@%3Cissues.guacamole.apache.org%3E
|
| tar | CVE-2016-6321 | MEDIUM | 2:1.26-35.el7 | | Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=7340f67b9860ea0531c1450e5aa261c50f67165d http://lists.gnu.org/archive/html/bug-tar/2016-10/msg00016.html http://packetstormsecurity.com/files/139370/GNU-tar-1.29-Extract-Pathname-Bypass.html http://seclists.org/fulldisclosure/2016/Oct/102 http://seclists.org/fulldisclosure/2016/Oct/96 http://www.debian.org/security/2016/dsa-3702 http://www.securityfocus.com/bid/93937 http://www.ubuntu.com/usn/USN-3132-1 https://access.redhat.com/security/cve/CVE-2016-6321 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201611-19 https://sintonen.fi/advisories/tar-extract-pathname-bypass.proper.txt https://sintonen.fi/advisories/tar-extract-pathname-bypass.txt https://ubuntu.com/security/notices/USN-3132-1
|
| tar | CVE-2018-20482 | LOW | 2:1.26-35.el7 | | Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454 http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html http://www.securityfocus.com/bid/106354 https://access.redhat.com/security/cve/CVE-2018-20482 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20482 https://lists.debian.org/debian-lts-announce/2018/12/msg00023.html https://lists.debian.org/debian-lts-announce/2021/11/msg00025.html https://news.ycombinator.com/item?id=18745431 https://security.gentoo.org/glsa/201903-05 https://twitter.com/thatcks/status/1076166645708668928 https://ubuntu.com/security/notices/USN-4692-1 https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
|
| tar | CVE-2019-9923 | LOW | 2:1.26-35.el7 | | Expand...http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00077.html http://savannah.gnu.org/bugs/?55369 https://access.redhat.com/security/cve/CVE-2019-9923 https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9923 https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://ubuntu.com/security/notices/USN-4692-1
|
| tar | CVE-2021-20193 | LOW | 2:1.26-35.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-20193 https://bugzilla.redhat.com/show_bug.cgi?id=1917565 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20193 https://git.savannah.gnu.org/cgit/tar.git/commit/?id=d9d4435692150fa8ff68e1b1a473d187cc3fd777 https://savannah.gnu.org/bugs/?59897 https://security.gentoo.org/glsa/202105-29 https://ubuntu.com/security/notices/USN-5329-1
|
| unzip | CVE-2015-7696 | MEDIUM | 6.0-21.el7 | | Expand...http://www.debian.org/security/2015/dsa-3386 http://www.openwall.com/lists/oss-security/2015/09/07/4 http://www.openwall.com/lists/oss-security/2015/09/15/6 http://www.openwall.com/lists/oss-security/2015/09/21/6 http://www.openwall.com/lists/oss-security/2015/10/11/5 http://www.securityfocus.com/bid/76863 http://www.securitytracker.com/id/1034027 http://www.ubuntu.com/usn/USN-2788-1 http://www.ubuntu.com/usn/USN-2788-2 https://access.redhat.com/security/cve/CVE-2015-7696 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696 https://nvd.nist.gov/vuln/detail/CVE-2015-7696 https://ubuntu.com/security/notices/USN-2788-1
|
| unzip | CVE-2015-7697 | MEDIUM | 6.0-21.el7 | | Expand...http://sourceforge.net/p/infozip/patches/23/ http://www.debian.org/security/2015/dsa-3386 http://www.openwall.com/lists/oss-security/2015/09/07/4 http://www.openwall.com/lists/oss-security/2015/09/15/6 http://www.openwall.com/lists/oss-security/2015/10/11/5 http://www.securityfocus.com/bid/76863 http://www.securitytracker.com/id/1034027 http://www.ubuntu.com/usn/USN-2788-1 http://www.ubuntu.com/usn/USN-2788-2 https://access.redhat.com/security/cve/CVE-2015-7697 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697 https://nvd.nist.gov/vuln/detail/CVE-2015-7697 https://ubuntu.com/security/notices/USN-2788-1
|
| unzip | CVE-2014-9913 | LOW | 6.0-21.el7 | | Expand...http://openwall.com/lists/oss-security/2016/12/05/20 http://www.openwall.com/lists/oss-security/2014/11/03/5 http://www.openwall.com/lists/oss-security/2016/12/05/13 http://www.openwall.com/lists/oss-security/2016/12/05/19 http://www.openwall.com/lists/oss-security/2016/12/05/20 http://www.securityfocus.com/bid/95081 https://access.redhat.com/security/cve/CVE-2014-9913 https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9913 https://nvd.nist.gov/vuln/detail/CVE-2014-9913 https://ubuntu.com/security/notices/USN-4672-1
|
| unzip | CVE-2016-9844 | LOW | 6.0-21.el7 | | Expand...http://openwall.com/lists/oss-security/2016/12/05/20 http://openwall.com/lists/oss-security/2016/12/05/25 http://www.openwall.com/lists/oss-security/2016/12/05/13 http://www.openwall.com/lists/oss-security/2016/12/05/19 http://www.openwall.com/lists/oss-security/2016/12/05/20 http://www.securityfocus.com/bid/94728 https://access.redhat.com/security/cve/CVE-2016-9844 https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9844 https://nvd.nist.gov/vuln/detail/CVE-2016-9844 https://ubuntu.com/security/notices/USN-4672-1
|
| unzip | CVE-2018-1000035 | LOW | 6.0-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2018-1000035 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000035 https://lists.debian.org/debian-lts-announce/2020/01/msg00026.html https://nvd.nist.gov/vuln/detail/CVE-2018-1000035 https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html https://security.gentoo.org/glsa/202003-58 https://ubuntu.com/security/notices/USN-4672-1 https://www.sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
|
| unzip | CVE-2021-4217 | LOW | 6.0-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-4217 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4217
|
| unzip | CVE-2022-0529 | LOW | 6.0-21.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0529 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0529 https://github.com/ByteHackr/unzip_poc https://nvd.nist.gov/vuln/detail/CVE-2022-0529
|
| unzip | CVE-2022-0530 | LOW | 6.0-21.el7 | | Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 https://access.redhat.com/security/cve/CVE-2022-0530 https://bugzilla.redhat.com/show_bug.cgi?id=2051395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0530 https://github.com/ByteHackr/unzip_poc https://nvd.nist.gov/vuln/detail/CVE-2022-0530 https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257
|
| util-linux | CVE-2014-9114 | MEDIUM | 2.23.2-61.el7 | | Expand...http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html http://www.openwall.com/lists/oss-security/2014/11/26/13 http://www.openwall.com/lists/oss-security/2014/11/26/21 http://www.securityfocus.com/bid/71327 https://access.redhat.com/security/cve/CVE-2014-9114 https://bugzilla.redhat.com/show_bug.cgi?id=1168485 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114 https://exchange.xforce.ibmcloud.com/vulnerabilities/98993 https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E https://security.gentoo.org/glsa/201612-14
|
| util-linux | CVE-2016-2779 | MEDIUM | 2.23.2-61.el7 | | Expand...http://www.openwall.com/lists/oss-security/2016/02/27/1 http://www.openwall.com/lists/oss-security/2016/02/27/2 https://access.redhat.com/security/cve/CVE-2016-2779 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
|
| util-linux | CVE-2022-0563 | MEDIUM | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0563 https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w@ws.net.home/T/#u https://nvd.nist.gov/vuln/detail/CVE-2022-0563 https://security.netapp.com/advisory/ntap-20220331-0002/
|
| util-linux | CVE-2015-5218 | LOW | 2.23.2-61.el7 | | Expand...http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html http://www.spinics.net/lists/util-linux-ng/msg11873.html https://access.redhat.com/security/cve/CVE-2015-5218 https://bugzilla.redhat.com/show_bug.cgi?id=1259322 https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8 https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
|
| util-linux | CVE-2021-37600 | LOW | 2.23.2-61.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-37600 https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c https://github.com/karelzak/util-linux/issues/1395 https://nvd.nist.gov/vuln/detail/CVE-2021-37600 https://security.netapp.com/advisory/ntap-20210902-0002/
|
| vim-minimal | CVE-2019-20807 | MEDIUM | 2:7.4.629-6.el7 | | Expand...http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html http://seclists.org/fulldisclosure/2020/Jul/24 https://access.redhat.com/security/cve/CVE-2019-20807 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20807 https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075 https://github.com/vim/vim/releases/tag/v8.1.0881 https://linux.oracle.com/cve/CVE-2019-20807.html https://linux.oracle.com/errata/ELSA-2020-4453.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://nvd.nist.gov/vuln/detail/CVE-2019-20807 https://support.apple.com/kb/HT211289 https://ubuntu.com/security/notices/USN-4582-1 https://ubuntu.com/security/notices/USN-5147-1 https://usn.ubuntu.com/4582-1/
|
| vim-minimal | CVE-2021-3778 | MEDIUM | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778 https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273 https://linux.oracle.com/cve/CVE-2021-3778.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3778 https://ubuntu.com/security/notices/USN-5093-1
|
| vim-minimal | CVE-2021-3796 | MEDIUM | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2021/10/01/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3778.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3796.json https://access.redhat.com/security/cve/CVE-2021-3796 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796 https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3 https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d https://linux.oracle.com/cve/CVE-2021-3796.html https://linux.oracle.com/errata/ELSA-2021-4517.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE62UMYBZE4AE53K6OBBWK32XQ7544QM/ https://nvd.nist.gov/vuln/detail/CVE-2021-3796 https://ubuntu.com/security/notices/USN-5093-1
|
| vim-minimal | CVE-2021-3872 | MEDIUM | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2021-3872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3872 https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8 https://linux.oracle.com/cve/CVE-2021-3872.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7K4JJBIH3OQSZRVTWKCJCDLGMFGQ5DOH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S42L4Z4DTW4LHLQ4FJ33VEOXRCBE7WN4/ https://nvd.nist.gov/vuln/detail/CVE-2021-3872 https://ubuntu.com/security/notices/USN-5147-1
|
| vim-minimal | CVE-2021-3984 | MEDIUM | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-3984 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3984 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655 (v8.2.3625) https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a https://linux.oracle.com/cve/CVE-2021-3984.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3984 https://ubuntu.com/security/notices/USN-5247-1 https://ubuntu.com/security/notices/USN-5433-1
|
| vim-minimal | CVE-2021-4019 | MEDIUM | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3984.json https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4019.json https://access.redhat.com/security/cve/CVE-2021-4019 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4019 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142 (v8.2.3669) https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92 https://linux.oracle.com/cve/CVE-2021-4019.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRPAI5JVZLI7WHWSBR6NWAPBQAYUQREW/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-4019 https://ubuntu.com/security/notices/USN-5247-1 https://ubuntu.com/security/notices/USN-5433-1
|
| vim-minimal | CVE-2021-4192 | MEDIUM | 2:7.4.629-6.el7 | | Expand...http://seclists.org/fulldisclosure/2022/Mar/29 http://seclists.org/fulldisclosure/2022/May/35 http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4192 https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952 https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22 https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22/ https://linux.oracle.com/cve/CVE-2021-4192.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-4192 https://support.apple.com/kb/HT213183 https://support.apple.com/kb/HT213256 https://ubuntu.com/security/notices/USN-5433-1
|
| vim-minimal | CVE-2021-4193 | MEDIUM | 2:7.4.629-6.el7 | | Expand...http://seclists.org/fulldisclosure/2022/Mar/29 http://seclists.org/fulldisclosure/2022/May/35 http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4193 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4193 https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0 https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0/ https://linux.oracle.com/cve/CVE-2021-4193.html https://linux.oracle.com/errata/ELSA-2022-0366.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-4193 https://support.apple.com/kb/HT213183 https://support.apple.com/kb/HT213256 https://ubuntu.com/security/notices/USN-5458-1
|
| vim-minimal | CVE-2022-0359 | MEDIUM | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0359 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0359 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1 (v8.2.4214) https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def https://linux.oracle.com/cve/CVE-2022-0359.html https://linux.oracle.com/errata/ELSA-2022-0894.html https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://nvd.nist.gov/vuln/detail/CVE-2022-0359 https://ubuntu.com/security/notices/USN-5458-1
|
| vim-minimal | CVE-2022-1619 | MEDIUM | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1619 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619 https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450 https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A6BY5P7ERZS7KXSBCGFCOXLMLGWUUJIH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUN33257RUM4RS2I4GZETKFSAXPETATG/ https://nvd.nist.gov/vuln/detail/CVE-2022-1619 https://ubuntu.com/security/notices/USN-5460-1
|
| vim-minimal | CVE-2022-1621 | MEDIUM | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1621 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621 https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b (v8.2.4919) https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ https://nvd.nist.gov/vuln/detail/CVE-2022-1621 https://ubuntu.com/security/notices/USN-5460-1
|
| vim-minimal | CVE-2022-1629 | MEDIUM | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629 https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIP7KG7TVS5YF3QREAY2GOGUT3YUBZAI/ https://nvd.nist.gov/vuln/detail/CVE-2022-1629
|
| vim-minimal | CVE-2017-1000382 | LOW | 2:7.4.629-6.el7 | | Expand...http://security.cucumberlinux.com/security/details.php?id=120 http://www.openwall.com/lists/oss-security/2017/10/31/1 https://access.redhat.com/security/cve/CVE-2017-1000382
|
| vim-minimal | CVE-2017-11109 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2017-11109 https://bugzilla.redhat.com/show_bug.cgi?id=1468492 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11109 https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html https://ubuntu.com/security/notices/USN-4309-1 https://usn.ubuntu.com/4309-1/ https://www.mail-archive.com/vim_dev@googlegroups.com/msg45274.html
|
| vim-minimal | CVE-2017-17087 | LOW | 2:7.4.629-6.el7 | | Expand...http://openwall.com/lists/oss-security/2017/11/27/2 http://security.cucumberlinux.com/security/details.php?id=166 https://access.redhat.com/security/cve/CVE-2017-17087 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17087 https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8 https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html https://ubuntu.com/security/notices/USN-4582-1 https://ubuntu.com/security/notices/USN-5147-1 https://usn.ubuntu.com/4582-1/
|
| vim-minimal | CVE-2017-5953 | LOW | 2:7.4.629-6.el7 | | Expand...http://www.debian.org/security/2017/dsa-3786 http://www.securityfocus.com/bid/96217 https://access.redhat.com/security/cve/CVE-2017-5953 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5953 https://github.com/vim/vim/commit/399c297aa93afe2c0a39e2a1b3f972aebba44c9d https://groups.google.com/forum/#!topic/vim_dev/t-3RSdEnrHY https://security.gentoo.org/glsa/201706-26 https://ubuntu.com/security/notices/USN-4016-1 https://ubuntu.com/security/notices/USN-4309-1 https://usn.ubuntu.com/4016-1/ https://usn.ubuntu.com/4309-1/
|
| vim-minimal | CVE-2017-6350 | LOW | 2:7.4.629-6.el7 | | Expand...http://www.securityfocus.com/bid/96448 http://www.securitytracker.com/id/1037949 https://access.redhat.com/security/cve/CVE-2017-6350 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6350 https://github.com/vim/vim/commit/0c8485f0e4931463c0f7986e1ea84a7d79f10c75 https://groups.google.com/forum/#!topic/vim_dev/L_dOHOOiQ5Q https://groups.google.com/forum/#!topic/vim_dev/QPZc0CY9j3Y https://security.gentoo.org/glsa/201706-26 https://ubuntu.com/security/notices/USN-4309-1 https://usn.ubuntu.com/4309-1/
|
| vim-minimal | CVE-2021-3903 | LOW | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903 https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43 https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8 https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BN4EX7BPQU7RP6PXCNCSDORUZBXQ4JUH/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DU26T75PYA3OF7XJGNKMT2ZCQEU4UKP5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://nvd.nist.gov/vuln/detail/CVE-2021-3903 https://ubuntu.com/security/notices/USN-5147-1
|
| vim-minimal | CVE-2021-3927 | LOW | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3927 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3927 https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/ https://nvd.nist.gov/vuln/detail/CVE-2021-3927 https://ubuntu.com/security/notices/USN-5147-1
|
| vim-minimal | CVE-2021-3974 | LOW | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-3974 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3974 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6 (v8.2.3612) https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IH2LS2DXBTYOCWGAKFMBF3HTWWXPBEFL/ https://nvd.nist.gov/vuln/detail/CVE-2021-3974 https://ubuntu.com/security/notices/USN-5247-1 https://ubuntu.com/security/notices/USN-5433-1
|
| vim-minimal | CVE-2021-4069 | LOW | 2:7.4.629-6.el7 | | Expand...http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4069 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4069 https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9 https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74 https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYB2LLNUFJUKJJ5HYCZ6MV3Z6YX3U5BN/ https://nvd.nist.gov/vuln/detail/CVE-2021-4069 https://ubuntu.com/security/notices/USN-5247-1 https://ubuntu.com/security/notices/USN-5433-1
|
| vim-minimal | CVE-2021-4166 | LOW | 2:7.4.629-6.el7 | | Expand...http://seclists.org/fulldisclosure/2022/Mar/29 http://seclists.org/fulldisclosure/2022/May/35 http://www.openwall.com/lists/oss-security/2022/01/15/1 https://access.redhat.com/security/cve/CVE-2021-4166 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4166 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682 (v8.2.3884) https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ https://nvd.nist.gov/vuln/detail/CVE-2021-4166 https://support.apple.com/kb/HT213183 https://support.apple.com/kb/HT213256
|
| vim-minimal | CVE-2022-0351 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-0351 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0351 https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d (v8.2.4206) https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161 https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html https://ubuntu.com/security/notices/USN-5458-1
|
| vim-minimal | CVE-2022-1154 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1154 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154 https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5 https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425 https://linux.oracle.com/cve/CVE-2022-1154.html https://linux.oracle.com/errata/ELSA-2022-1552.html https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C2CQXRLBIC4S7JQVEIN5QXKQPYWB5E3J/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAIQTUO35U5WO2NYMY47637EMCVDJRSL/ https://nvd.nist.gov/vuln/detail/CVE-2022-1154 https://ubuntu.com/security/notices/USN-5433-1
|
| vim-minimal | CVE-2022-1720 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-1720 https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8 https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
|
| vim-minimal | CVE-2022-2124 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-2124 https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42 https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
|
| vim-minimal | CVE-2022-2125 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-2125 https://github.com/vim/vim/commit/0e8e938d497260dd57be67b4966cb27a5f72376f https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
|
| vim-minimal | CVE-2022-2126 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-2126 https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8 https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e https://lists.debian.org/debian-lts-announce/2022/06/msg00014.html
|
| vim-minimal | CVE-2022-2129 | LOW | 2:7.4.629-6.el7 | | Expand...https://access.redhat.com/security/cve/CVE-2022-2129 https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
|
| wget | CVE-2021-31879 | MEDIUM | 1.14-18.el7_6.1 | | Expand...https://access.redhat.com/security/cve/CVE-2021-31879 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31879 https://mail.gnu.org/archive/html/bug-wget/2021-02/msg00002.html https://nvd.nist.gov/vuln/detail/CVE-2021-31879 https://savannah.gnu.org/bugs/?56909 https://security.netapp.com/advisory/ntap-20210618-0002/
|
| wget | CVE-2017-6508 | LOW | 1.14-18.el7_6.1 | | Expand...http://git.savannah.gnu.org/cgit/wget.git/commit/?id=4d729e322fae359a1aefaafec1144764a54e8ad4 http://lists.gnu.org/archive/html/bug-wget/2017-03/msg00018.html http://www.securityfocus.com/bid/96877 https://access.redhat.com/security/cve/CVE-2017-6508 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508 https://security.gentoo.org/glsa/201706-16 https://ubuntu.com/security/notices/USN-3464-1 https://ubuntu.com/security/notices/USN-3464-2
|
| xz | CVE-2022-1271 | HIGH | 5.2.2-1.el7 | 5.2.2-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2022-1271 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271 https://errata.almalinux.org/8/ALSA-2022-1537.html https://linux.oracle.com/cve/CVE-2022-1271.html https://linux.oracle.com/errata/ELSA-2022-5052.html https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html https://ubuntu.com/security/notices/USN-5378-1 https://ubuntu.com/security/notices/USN-5378-2 https://ubuntu.com/security/notices/USN-5378-3 https://ubuntu.com/security/notices/USN-5378-4 https://www.openwall.com/lists/oss-security/2022/04/07/8
|
| xz-libs | CVE-2022-1271 | HIGH | 5.2.2-1.el7 | 5.2.2-2.el7_9 | Expand...https://access.redhat.com/security/cve/CVE-2022-1271 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271 https://errata.almalinux.org/8/ALSA-2022-1537.html https://linux.oracle.com/cve/CVE-2022-1271.html https://linux.oracle.com/errata/ELSA-2022-5052.html https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html https://ubuntu.com/security/notices/USN-5378-1 https://ubuntu.com/security/notices/USN-5378-2 https://ubuntu.com/security/notices/USN-5378-3 https://ubuntu.com/security/notices/USN-5378-4 https://www.openwall.com/lists/oss-security/2022/04/07/8
|
| zlib | CVE-2018-25032 | HIGH | 1.2.7-18.el7 | 1.2.7-20.el7_9 | Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 http://www.openwall.com/lists/oss-security/2022/03/25/2 http://www.openwall.com/lists/oss-security/2022/03/26/1 https://access.redhat.com/security/cve/CVE-2018-25032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032 https://errata.almalinux.org/8/ALSA-2022-2201.html https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 https://github.com/madler/zlib/issues/605 https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4 https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5 https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ https://linux.oracle.com/cve/CVE-2018-25032.html https://linux.oracle.com/errata/ELSA-2022-2213.html https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/ https://nvd.nist.gov/vuln/detail/CVE-2018-25032 https://security.netapp.com/advisory/ntap-20220526-0009/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5355-1 https://ubuntu.com/security/notices/USN-5355-2 https://ubuntu.com/security/notices/USN-5359-1 https://ubuntu.com/security/notices/USN-5359-2 https://www.debian.org/security/2022/dsa-5111 https://www.openwall.com/lists/oss-security/2022/03/24/1 https://www.openwall.com/lists/oss-security/2022/03/28/1 https://www.openwall.com/lists/oss-security/2022/03/28/3
|
| zlib-devel | CVE-2018-25032 | HIGH | 1.2.7-18.el7 | 1.2.7-20.el7_9 | Expand...http://seclists.org/fulldisclosure/2022/May/33 http://seclists.org/fulldisclosure/2022/May/35 http://seclists.org/fulldisclosure/2022/May/38 http://www.openwall.com/lists/oss-security/2022/03/25/2 http://www.openwall.com/lists/oss-security/2022/03/26/1 https://access.redhat.com/security/cve/CVE-2018-25032 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032 https://errata.almalinux.org/8/ALSA-2022-2201.html https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531 https://github.com/madler/zlib/compare/v1.2.11...v1.2.12 https://github.com/madler/zlib/issues/605 https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4 https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5 https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ https://linux.oracle.com/cve/CVE-2018-25032.html https://linux.oracle.com/errata/ELSA-2022-2213.html https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/ https://nvd.nist.gov/vuln/detail/CVE-2018-25032 https://security.netapp.com/advisory/ntap-20220526-0009/ https://support.apple.com/kb/HT213255 https://support.apple.com/kb/HT213256 https://support.apple.com/kb/HT213257 https://ubuntu.com/security/notices/USN-5355-1 https://ubuntu.com/security/notices/USN-5355-2 https://ubuntu.com/security/notices/USN-5359-1 https://ubuntu.com/security/notices/USN-5359-2 https://www.debian.org/security/2022/dsa-5111 https://www.openwall.com/lists/oss-security/2022/03/24/1 https://www.openwall.com/lists/oss-security/2022/03/28/1 https://www.openwall.com/lists/oss-security/2022/03/28/3
|